Upload
dohanh
View
217
Download
0
Embed Size (px)
Citation preview
COUNTERTERRORISMSINCE 9/11Evaluating the Efficacy of
Controversial Tactics
BY NICK ADAMS, TED NORDHAUS AND MICHAEL SHELLENBERGER
T H E S C I E N C E O F S E C U R I T Y
A p r o j e c t o f t h e B r e a k t h r o u g h I n s t i t u t e
S P R I N G 2011
COUNTERTERRORISMSINCE 9/11Evaluating the Efficacy of
Controversial Tactics
BY NICK ADAMS, TED NORDHAUS AND MICHAEL SHELLENBERGER
4 3 6 1 4 T H S T R E E T, S U I T E 8 2 0 , O A K L A N D , C A 9 4 6 1 2 ,
P H O N E : 5 1 0 - 5 5 0 - 8 8 0 0 W E B S I T E : w w w. t h e b r e a k t h r o u g h . o r g
TABLE OF CONTENTS ....................................................................3
EXECUTIVE SUMMARY..................................................................4
Key Findings ...........................................................................................4
INTRODUCTION.............................................................................6
EVALUATIVE METHODS .................................................................7
Previous CT Evaluation.............................................................................7
Our Approach ..........................................................................................7
TACTICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTERTERRORISM 10
The Evolution of U.S. CT Strategy ............................................................10
The Emerging Counterterrorism Strategy ...................................................13
Operational Challenges to CT: Sorting Information, Coordinating Intelligence 14
EVALUATING CONTROVERSIAL COUNTERTERRORISM TACTICS ........16
Expanded Surveillance and Search Tools ..................................................16
Ethnic/Religious and Behavioral Profiling .................................................23
‘Enhanced Interrogation Techniques’17 ....................................................28
Detention and Prosecution of Terrorism Suspects ......................................35
DISCUSSION AND CONCLUSIONS .................................................40
RECOMMENDATIONS...................................................................41
AUTHORS’ NOTE .........................................................................43
WORKS CITED ............................................................................44
ENDNOTES .................................................................................46
EXTENDED BIBLIOGRAPHY...........................................................48S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
TABLE OF CONTENTS ..............................................................3
EXECUTIVE SUMMARY ............................................................4
Key Findings ...................................................................................4
INTRODUCTION......................................................................6
EVALUATIVE METHODS............................................................7
Previous CT Evaluation ......................................................................7
Our Approach ..................................................................................7
TACTICS IN CONTEXT:
THE STRATEGY AND CHALLENGES OF COUNTERTERRORISM ..........10
The Evolution of U.S. CT Strategy .......................................................10
The Emerging Counterterrorism Strategy ..............................................13
Operational Challenges to CT:
Sorting Information, Coordinating Intelligence ..........................................14
EVALUATING CONTROVERSIAL COUNTERTERRORISM TACTICS .......16
Expanded Surveillance and Search Tools .............................................16
Ethnic/Religious and Behavioral Profiling .............................................23
‘Enhanced Interrogation Techniques’ ...................................................28
Detention and Prosecution of Terrorism Suspects ...................................35
DISCUSSION AND CONCLUSIONS .............................................40
RECOMMENDATIONS .............................................................41
TABLE OF CONTENTS
AUTHORS’ NOTE 43WORKS CITED 44ENDNOTES 46EXTENDED BIBLIOGRAPHY 48
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
4
In the wake of 9/11, the U.S. government employed several new counterterrorism (CT) tactics,
some of which aroused a great deal of controversy. The controversial tactics included ‘enhanced’
interrogation, preventative detention, expanded use of secret surveillance without warrants,
ethnic/religious profiling, the collection and mining of domestic data, and the prosecution of terror
suspects in military tribunals. While there has been great debate over the morality and legality
of these controversial measures, there has been significantly less attention dedicated to evaluating
whether the tactics work to prevent terrorism. Even so, people on both sides of the security v.
morality/legality debate make assumptions about the efficacy of various CT measures. Here we
review multiple literatures to assess the efficacy of controversial CT tactics on their own terms,
and evaluate their potential utility within larger state security strategies that depend on intelligence
management, informant-recruiting, and maintenance of state legitimacy. We find good evidence
that controversial CT tactics may have been counterproductive in several ways: increasing the ratio
of informational ‘noise’ to terrorist ‘signal,’ undermining the state’s legitimacy among potential
civilian informants, and legitimizing terrorists’ preferred status as ‘warriors.’ In no case is there
credible evidence showing that these controversial CT measures significantly helped catch terrorists
or offered other strategic advantages outweighing their disadvantages.
Key Findings1. THE MOST EFFECTIVE CT MEASURES ARE ALSO THE LEAST CONTROVERSIAL. Across a range
of government, think tank, and media reports, experts expressed general agreement on
several elements of effective CT strategy, including: denying terrorists safe haven, drying up
their funding channels1, preventing them from accessing weapons of mass destruction,
establishing multiple layers of port and border security, undermining terrorists’ recruiting
messages, and bolstering perceptions of state legitimacy to encourage the cooperation of
bystander communities.
2. WE FOUND NO CREDIBLE EVIDENCE DEMONSTRATING THAT THE USE OF CONTROVERSIAL CT
MEASURES COULD HAVE HELPED PREVENT 9/11. NOR DID WE FIND CREDIBLE EVIDENCE THAT
CONTROVERSIAL CT TACTICS HAVE PLAYED ANY SIGNIFICANT ROLE IN FOILING PLOTS SINCE.
Though some have suggested that post-9/11 CT tactics have aided efforts to thwart terrorist
attacks, all available credible evidence suggests that the foiling of terrorist plots since 9/11 has
owed to the help of citizen informants, foreign intelligence tips, and standard police work —
a conclusion that security officials and other recent analyses affirm (Difo 2010).2
EXECUTIVE SUMMARY
5
EXECUT IVE SUMMARY
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
3. WE COULD FIND NO CREDIBLE EVIDENCE SUPPORTING CLAIMS OF EFFICACY FOR CONTROVERSIAL
CT TACTICS. After an 18-month investigation and the review of well over 500 Government
Accountability Office and Inspectors General reports, declassified intelligence documents, court
transcripts, testimonials by security agents, and other documents, we could find no evidence
demonstrating the efficacy of controversial CT tactics. Conversations with top national security
and CT experts confirmed the absence of credible evidence. The burden of proving the tactics'
efficacy today lies with those who promote their use.
4. THE EXPANSION OF INVESTIGATIVE AND SURVEILLANCE POWERS AFTER 9/11 APPEARS TO COM-
POUND THE CHALLENGES FACED BY SECURITY AND INTELLIGENCE AGENCIES BY INCREASING THE
AMOUNT OF INFORMATIONAL ‘NOISE’ THEY MUST FILTER OUT TO DETECT TERRORIST ‘SIGNALS.’
Signal detection, not intelligence-gathering, failed in the run-up to 9/11 and in the case of the
would-be Christmas Day bomber. Policies allowing for easy surveillance of people who have lit-
tle reason to be suspected of terrorism have flooded security agencies with informational noise
and generated thousands of false leads that distract them from real threats. These signal
detection failures are reflected in data on the numbers of cases the FBI has recommended for
DOJ prosecution. Despite a several-fold increase in the use of expanded search and surveillance
tools, the FBI is generating far fewer cases for prosecution than they did in 2002 and many
more of them are being declined by the DOJ because they lack evidence of wrongdoing.
5. EVIDENCE SUGGESTS THAT ETHNIC AND RELIGIOUS PROFILING, DIMINISHED DUE PROCESS STAN-
DARDS, AND 'ENHANCED INTERROGATION TECHNIQUES' ALIENATE PEOPLE WHO MIGHT PRODUCE
USEFUL INFORMATION FOR LAW ENFORCEMENT. Countering terrorism requires that the state win
the battle for “hearts and minds” among bystander populations. By treating populations with
suspicion, the state may be discouraging cooperation and even reinforcing terrorist narratives
and recruitment efforts.
6. FOR THE ABOVE REASONS AND OTHERS, CONTROVERSIAL CT TACTICS HAVE BECOME INCREASINGLY
UNPOPULAR WITHIN MILITARY AND SECURITY AGENCIES SINCE 9/11. After using some ethnic
and religious profiling shortly after 9/11, many in the FBI and TSA have come to see that form
of profiling as a potentially dangerous distraction. Military and FBI leaders have condemned
the use of torture, and the CIA has all but renounced enhanced interrogation. Many retired and
active Generals, including Gen. David Petraeus, have declared the detentions at Guantanamo
Bay a security risk to U.S. troops.
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
In the years since the terrorist attacks of September 11, 2001 there has been great debate among
policymakers and the public over the morality and legality of controversial domestic counterterror-
ism (CT) tactics like ‘enhanced interrogation,’ preventative detention, expanded search and
surveillance powers, ethnic and religious profiling, the collection and mining of domestic data, and
the prosecution of terror suspects in military tribunals. There has been strikingly less discussion over
whether these tactics have succeeded on their own terms to prevent terrorist attacks, disrupt terrorist
networks, deliver better intelligence, or end terrorism campaigns.
Opponents of controversial CT tactics often argue that the legal and moral principles violated by
the tactics are so fundamental to American character that they should be held sacrosanct even in the
face of terrorist threats. Proponents argue that the government should make exceptions to normal
peace-time law and employ controversial CT tactics that uphold a higher morality of saving
American lives. Neither group has seriously or consistently questioned the assumptions underlying
this debate – that controversial CT tactics effectively reduce levels of terrorism. A close examination
of that assumption could dissolve this major front of American political contestation since almost
no public figure would support demonstrably ineffective (or even counterproductive) CT policies.
The implications of CT tactic evaluation, of course, go well beyond American political discourse.
The 21st century appears to be one in which nation-states will continue to be susceptible to the vio-
lent political challenges of small groups of determined militants. If these states do not continually
evaluate their tactics and approaches as they respond to disparate and evolving security challenges,
they diminish their likelihood of success in their efforts to curb future political violence while pro-
moting or maintaining other state objectives.
The paper will unfold in six sections. In Section II, we review the limitations and challenges of past
and present CT evaluation research as we articulate our approach to the task. Finding that tactical
evaluation is meaningful only in relation to some strategy, we outline U.S. CT strategy in Section
III. There, we identify strategic objectives and key operational challenges of CT – including promot-
ing state legitimacy, encouraging cooperative relationships with bystander communities,
undermining terrorists’ narratives, and prioritizing and coordinating intelligence – that can be used
as supplemental criteria for tactical evaluation (in addition to evaluating CT tactics in terms of their
ability to meet their own objectives). Section IV is the heart of the paper, dedicated to the evalua-
tion of controversial CT tactics in terms of the methods and criteria established in Sections II and
III. Section V briefly summarizes and discusses the key findings of Section IV. And finally, Section
VI closes the paper with some recommendations to policymakers and NGOs.
6
INTRODUCTION
EVALUATIVE METHODS
Evaluations of CT tactics are rare, but some do
exist (For a review see Lum and Kennedy 2006,
or Crenshaw 2009). Their scarcity reflects, in
part, understandable limitations on the scope
or design of previous CT research. Also, the
classification of information potentially relevant
for CT evaluation appears to discourage some
authors from approaching the task. Another
challenge stems from the fact that the criteria
upon which tactics can be evaluated often
depend on shifting CT strategies in which they
are embedded. We address these obstacles to
assessing CT tactics as we describe our
approach to the challenge.
Previous CT EvaluationMost previous counter-terrorism evaluations
have assessed entire national CT policy regimes
without focusing on individual policies or
tactics. By measuring numbers of terrorist
incidents or death tolls before and after the
implementation of a CT policy regime (Hewitt
1984; Department of State 2001-2008; Sheehan
2007), authors have been able to conclude that
states either failed or succeeded in their overall
efforts. However, such methods imply that
CT policy regimes are indivisible in their
composition and coherent in their effects.
The methods fail to tease out which tactics
caused a decrease or increase in terrorist inci-
dents or deaths, and risk suggesting causal
relationships to policymakers and the public
that may not exist.
Other analysts have evaluated CT policy
regimes qualitatively (Charters, 1994; Schmid
and Crelinsten 1993; Wilkinson 2001; Art and
Richardson 2007; Cronin 2009), but still rarely
go into detail about the efficacy of specific tac-
tics. When they do, their accounts are often so
historically embedded that readers may have
difficulty distilling general lessons about when
particular CT tactics might be useful or not.
Qualitative researchers’ conclusions, too (like
those of their counterparts employing more sta-
tistical approaches), tend to focus much more
attention on broad CT strategies or policy
regimes than on individual tactics.
Researchers’ focus on the evaluation of CT
strategy is not inappropriate. CT research is still
an emerging field and a case can be made that
questions bearing on strategy often deserve
logical priority to those evaluating tactics.
In fact, we employ a method of tactical evalua-
tion that takes strategic considerations into
account. But, we think focusing on strategic
questions to the exclusion of tactical evaluation
can fail to uncover those tactics that may actu-
ally be ineffective or even counterproductive for
an overarching CT approach.
Our ApproachCT policies and tactics can and should be eval-
uated individually so that counter-terrorism can
continually improve in response to evolving ter-
rorist threats. Our method for evaluating CT
tactics is two-fold. First, we ask if the CT tactic
achieves its particular aim. Second, we ask if
7
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
8
ondary to some CT strategies, are important for
the current U.S. strategy against Al Qaeda and
its affiliates and allies who continue to target
U.S. interests. We note, therefore, that this
paper, while its conclusions may be broadly
applicable to many CT campaigns, is specifi-
cally geared for evaluating CT tactics employed
by the U.S. against militant irhabis3 who target
the West.
In Section III we briefly outline the develop-
ment and basic shape of U.S. CT strategy and
provide further rationale for evaluating CT
tactics by the criteria we have listed above.
While we do not offer a detailed threat assess-
ment and evaluation of counterterrorism
practices (available in a forthcoming docu-
ment), we briefly describe in this section the
evolution of U.S. CT efforts from the pre-9/11
period through today and highlight elements
of those efforts with which effective CT tactics
should be compatible.
Our main analyses in Section IV pull together
the work of many scholars, journalists,
archivists, historians, think-tank analysts, and
government-commissioned investigators. While
this paper has been motivated by the relative
dearth of reports carefully evaluating CT
tactics’ efficacy – and, as far as we are aware,
the nonexistence of a single document compil-
ing those evaluations and placing them in
productive dialogue with other security
literatures – we have drawn heavily from the
few documents that do assess CT tactics.
EVALUAT IVE METHODS
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
the CT tactic has secondary consequences for
broader CT efforts.
In the first step, we simply ask, for instance,
whether expanding investigators’ search, sur-
veillance, or seizure powers after 9/11 has
actually allowed law enforcement and intelli-
gence agents to more easily capture terrorist
plotters. We have been able to answer this
question – and others like it – by referring to
the explicit or implicit intentions of the CT
tactic and comparing those to the effects of its
implementation as reflected in various reports
describing what CT tools have been vital in
foiling terrorists’ efforts. We also often employ
a counterfactual analysis to the events of
September 11th, asking: ‘If CT tactic X had
been used prior to 9/11 would the attacks have
been prevented?’
The second step in our evaluative approach asks
whether CT tactics (whether or not they accom-
plish their stated objectives) have secondary
consequences for broader CT efforts. We pay
particular attention to how the tactics overcome
or exacerbate the key challenges of U.S. coun-
terterrorism – gathering useful information,
prioritizing and coordinating intelligence,
promoting state legitimacy, encouraging com-
munity-generated tips and the support of
bystanders, and undermining terrorists’ narra-
tives. Some of these operational imperatives –
like intelligence gathering, prioritizing, and
coordinating – are common to virtually all CT
campaigns. The others, while potentially sec-
9
Among them are evaluations of the efficacy
of enhanced interrogation (see Rejali 2009;
Fein et al. 2006; Rumney 2005-2006), civilian
vs. military trials for terrorism suspects
(Greenberg et al 2010; Zabel 2009; Gude 2010),
airport screening relying on ethnic profiling
(Chakrabati and Strauss 2002; Press 2009;
Sandomir 2009), and data-mining techniques
(National Research Council 2008; Jonas and
Harper 2006). We review these documents
along with related government documents,
news accounts, suspect interviews, indictments,
Congressional testimony, and journalistic
investigations about terrorist plots and efforts
to disrupt them.
We also draw on history and the social sciences
to evaluate CT efficacy in a wider context.
So, for example, in considering the effects of
expanded surveillance activities since 9/11,
we employ ‘signal detection theory’ to evaluate
whether increasing informational ‘noise’ has
reduced detection of the terrorist ‘signal’. We
draw on psychological research into human
motivation to explore how coercive interroga-
tion might exacerbate unproductive adversarial
relationships between interrogators and their
subjects. In weighing the efficacy of detention
policies, we consider their impact on percep-
tions of state legitimacy in communities whose
cooperation may be vital to CT efforts. We
consider the results of mathematical models
of social learning for evaluating the efficacy
of airport profiling policies over time. And we
consider how sociological theories of labeling
and deviance may predict that terrorists would
prefer to be tried (or even plead guilty) in mili-
tary tribunals.
While CT is often imagined as a shadowy,
secretive enterprise, much of how CT functions
is known through years of court cases, news
coverage, congressional testimony, books by
high-ranking government security figures,
investigative journalism, extensive leaks and
declassifications, and countless government
oversight reports. These sources constitute a
robust body of publicly available information
describing the uses and outcomes of the CT
tactics we evaluate in this report.
A final important challenge to evaluating CT
tactics is the fact that interpreting their effects
depends, at least in part, on the broader strategy
they are meant to advance. We now turn to a
discussion of that CT strategy and the primary
challenges to its implementation in order to
identify and clarify contextual criteria by which
we evaluate CT tactics’ efficacy.
EVALUAT IVE METHODS
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
10
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
Because CT tactics impact broader CT strategy,
their efficacy cannot be evaluated only in terms
of their intended objectives. A tactic that effec-
tively meets its own objectives (e.g. destroying a
terrorist safehouse) could nonetheless be harm-
ful to CT strategy if it excludes the use of some
other tactic better able to advance strategic aims
(e.g. surveilling the safehouse and its members
to learn more about their network and their
upcoming operations). And because the imple-
mentation of any strategy is challenged at the
level of operations (between high-level strategy
and its on-the-ground tactical implementation),
tactics must also be evaluated for their role
in overcoming or exacerbating key operational
challenges. In counterterrorism campaigns –
because terrorists act covertly– a key opera-
tional challenge involves managing information
about terrorists’ movements and plans. Below,
we briefly outline U.S. CT strategy and explore
its operational challenges.
The Evolution of U.S. CT StrategyThe counterterrorism strategy of the United
States has evolved throughout the latter half
of the 20th century. In the 1960s, extremist
Islamist terrorist acts rarely affected Americans
directly. When they did, death tolls were
small and the historical, policy, and political
consequences were usually slight. Presidents
were even routinely advised to avoid engaging
directly in CT decisions since “there was little
the U.S. government could do to prevent […]
attacks, and it would be better to shield
the White House from future blame” (Naftali
2005, 45).
By the 1970s and ‘80s, however, threats from
terrorists at home and abroad had inspired the
development of CT working groups and task
forces in several bureaus of government.4 While
U.S. Presidents and Congress dedicated consid-
erable resources to uncovering and stopping
amateur militants, they also hewed closely to a
strategy of denying terrorist the attention they
needed to grow their movements (See Naftali
2005, Chapters 2 and 4). Historical precedent
had also suggested that states too eager to fight
terrorists often ceded legitimacy to militant
groups by becoming too brutal, or too repres-
sive (e.g. Argentina, Columbia). Overzealous
security measures could actually drive some
populations into terrorists’ hands. As long as
the state’s moderate course (based mostly in law
enforcement techniques) did not undermine cit-
izens’ trust in its ability to keep them safe, it did
not appear useful to act in dramatic fashion.
To many, the events of 9/11 seemed to repudi-
ate a strategy based on starving terrorists of the
attention they sought. There was no ignoring
or downplaying the atrocities. The state’s
legitimacy and reputation as a protector of its
population had been frontally attacked.
Within days, nearly every commentator inside
and outside U.S. security establishments
declared that Al Qaeda must be denied a safe
haven from which it could plot, train for, and
TACTICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTERTERRORISM
11
TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
material to execute a nuclear attack (Mueller
and Center 2008; Bergen and Hoffman 2010).
Overlapping U.N. and international initiatives
have also focused on reducing chemical and
biological weapons proliferation by tracking
and regulating the international sale of danger-
ous materials. Together, these initiatives have
sought to reduce the threat of mass-casualty ter-
rorism without requiring states to protect all
potential targets at all times.6
In addition to working to secure the materials
of terrorism at their source, the U.S. has also
raised security levels at its borders and other
points of entry into the country. The formaliza-
tion of airport screening by the Transportation
Security Agency (TSA) raised barriers to more
weapons and explosives. And recent improve-
ments to the passenger pre-screening system
(discussed more thoroughly below) demonstrate
its continual (if sometimes lagging) evolution
with the terrorist threat. Despite popular
criticism that the U.S. screens too few of the
containers entering its ports, the Container
Security Initiative of the Department of
Homeland Security has also secured interna-
tional cooperation with ports around the world
to increase screening of nearly 86% of the
cargo that eventually enters the U.S. (Deflem
2010, 51). Other agencies, like the Bureau of
Immigration and Customs Enforcement and
Customs and Border Protection round out a
multi-layered defense of American borders that
includes the securing of trade routes abroad
and ports of entry at home (Ibid.).
carry out future offensives. Weeks later, with
widespread international support, the U.S. led
an air and ground campaign into Afghanistan
to root out Al Qaeda and their Taliban hosts.
Though coalition forces were not able to cap-
ture Al Qaeda and Taliban leadership who
crossed into Pakistan, they destroyed much of
the middle tier of Al Qaeda’s central organiza-
tion, crippling the group and successfully
denying it uncontested safe haven.
Security experts also agreed that terrorism
could be combated by denying violent groups
the resources they need to be successful. Taking
advantage of an international mood favoring
cooperation, the U.S. led global efforts to secure
and monitor money and weapons that could
be used by violent anti-government groups.
The Department of the Treasury partnered with
Belgium’s Society for Worldwide Interbank
Financial Telecommunication (SWIFT) to track
and disrupt a significant portion of Al Qaeda’s
funding network5. And recent reports suggest
that Al Qaeda’s Afghanistan/Pakistan organi-
zation is experiencing financial difficulties
(Levitt 2008, 8; Asharq Al-Awsat 2010).
The existence of an apparently robust network
of sophisticated terrorists amplified unrealized
fears of nuclear terrorism that had circulated
since the 1950s. In response, international part-
nerships to track and secure nuclear weapons
accelerated starting in late 2001 and, by many
accounts, have helped reduce the already low
probability that terrorists could access enough
12
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
President Bush and Congress also followed a
policy consensus arrived at by two blue ribbon
panels from the previous administration,
creating a Department of Homeland Security
(DHS) and passing legislation updating the
information-sharing practices of the intelligence
agencies.7 Recent reports, especially in the
Washington Post, suggest that efforts to
coordinate intelligence sharing – a key recom-
mendation of the 9/11 Commission – have
not proceeded as quickly or effectively as
planned. Although efficient information sharing
appears to depend as much on institutional
culture as design,8 organizational changes have
begun to increase the intelligence community’s
capacity to link information from multiple
sources and agencies.
In keeping with a theme that restrained
responses to terrorism had weakened the
United States, President Bush and Congress
also responded with policies seeking to give
federal investigators and intelligence agencies
expanded tools with which to do their work.
Some PATRIOT Act provisions made it easier
for federal investigators to surveil people, or
search or seize their property. While the 14th
amendment made it illegal for the government
to single out American citizens for investigation
based on their race, ethnicity, or religion, the
FBI and Immigration officials pushed against
this boundary with “voluntary” interviews
of Muslim and Arab americans and the
targeted “Special Registration” of Muslim
and Arab immigrants. The Department of
Justice also selectively detained or deported
over 700 Arab and South Asian men - many
students - for minor visa violations that typi-
cally would not have been enforced.
Though the U.S. had claimed a tradition
against domestic spying for most of its history,
President Bush signed a secret executive order
allowing the National Security Agency (NSA)
to intercept Americans’ telephonic and elec-
tronic communications to and from foreign
sources. The President also detained several
hundred men on or near the battlefields of the
“War on Terror,” foreclosed their rights to
habeas corpus petitions – disallowing them due
process rights for their self-defense in a court of
law – and created military tribun in which they
could be convicted by evidence inadmissible in
traditional criminal courts. The President, CIA,
and Department of Justice (DOJ) also worked
together to formalize a regime of physically and
psychologically coercive interrogation proce-
dures in the hope that the tools could elicit
more information from terrorists than conven-
tional interrogation techniques. The
Department of Defense (DOD) simultaneously
outlined its own set of coercive detention and
interrogation practices.
Unlike the creation of multi-layered defenses
and even the invasion of Afghanistan (which
enjoyed widespread global support), these U.S.
expansions of police and intelligence agencies’
powers contravened the older counterterrorist
wisdom that state action should preserve its
TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM
13
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
own legitimacy and deny terrorists rhetorical
ammunition with which to recruit followers.
But in the aftermath of the horrors of
September 2001, and amid the ongoing fears
that other attacks may be coming, such
wisdom was cast aside in favor of more
aggressive tactics.
The Emerging Counterterrorism StrategyOver time, increasing numbers of CT
researchers and strategists have come to articu-
late an approach to CT that combines some
elements of past strategies while also emphasiz-
ing the importance of winning the “hearts and
minds” of populations that terrorists would like
to recruit to their cause. Such rethinking has
often come from individuals within the
traditional security apparatus including from
General David Petraeus, General Stanley
McChrystal, General Sir Rupert Smith (UK),
Mike German (former FBI), Tom Parker
(former MI-5), Stephen Kleinmann (Air Force
reserve Colonel and former interrogator),
Matthew Alexander (former Air Force inter-
rogator in Iraq), and many more. Though U.S.
CT strategy has shifted within the last decades,
the current approach is based on the following
objectives:
¢ Deny terrorists safe haven by conducting
offensive military operations.
¢ Deny terrorists access to financial networks.
¢ Deny terrorists access to weapons of mass
destruction (WMDs) or the materials for
their production.
¢ Establish multiple layers of security
screening for people and objects entering
the country.
¢ Undermine terrorists’ recruitment
capability.
¢ Enhance perceptions of state legitimacy
among the very people terrorists would
like to recruit to their cause and win their
loyalty by:
¢ Providing these communities with
direct aid or protection.
¢ Building cooperative relationships
with them.
¢ Avoiding unnecessary casualties,
abuse, or intimidation.
¢ Encourage these same communities to
disavow and expose terrorists who may
be in their midst.
Efforts to win the support of bystanders to
terrorism and counterterrorism (bullet points
six and seven) have become more prominent
elements of U.S. CT strategy in the years
since abuses at Abu Ghraib, Bagram, and
Guantanamo prisons inflamed an anti-U.S.
backlash among many Muslims (See Sheehan
2009 for a quantitative analysis of this back-
lash). Several works of CT scholarship (an
increasingly popular field of interdisciplinary
study) have also contributed to this shift in
strategic emphasis. Canvassing the history
of state clashes with terrorists, various authors
have found that approaches which abuse or
TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM
14
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
repress bystander populations rarely speed the
end of terrorism campaigns and often prolong
them by transferring legitimacy from states
to terrorist groups (Hewitt 1984; Art and
Richardson 2007; Schmid and Crelinsten 1993;
Charters, 1994; Wilkinson 2001; Sheehan 2009;
Cronin 2009).
Emerging CT thought increasingly stresses the
importance of state legitimacy for CT strategy.
Establishing, maintaining and enhancing the
legitimacy of CT operations encourages reliable
reporting from communities in which terrorists
might be embedded, undermines terrorist narra-
tives charging the state with hypocrisy, and
inspires cooperation from international allies.
Legitimacy is thus seen as critical to the secu-
rity of the nation state at home and abroad.
In many ways, the newfound emphasis on
legitimacy reflects the state’s relearning of its
basic nature. Max Weber defined the state as
“a human community that (successfully) claims
a monopoly on the legitimate use of physical force
within a given territory” (italics in the original;
Weber 1946, 78). While this quote has some-
times been reduced to the state having the
“monopoly on violence,” Weber emphasizes
its “legitimate use.”
A state that uses force illegitimately — arbitrar-
ily, selectively, or for personal rather than public
interests — may undermine the basis of its
power as much as a state that fails to use force
to defend itself and its citizens against external
or internal aggressors. In the case of CT, states
that use force illegitimately risk alienating
potential citizen informants who are often criti-
cal to disrupting terrorist plots and networks.
Citizen informants provided intelligence that
helped foil many plots including those of the
Lackawanna Six in 2002, The Portland Seven
in 2003, James Elshafay and Shahawar Siraj
in 2004, Michael Reynolds in 2005, and Faisal
Shahzad in 2010 (Difo 2010).
As we evaluate CT tactics below, we will fre-
quently use elements of current U.S. CT
strategy as criteria to judge the efficacy of the
tactics. If a tactic is successful in some regard
but harms CT strategy overall – for instance,
if it is perceived as abusive or illegitimate and
causes people to think twice about reporting
a relative, friend, or neighbor engaged in
terrorist activities – its overall efficacy may be
questionable. Before we move to those tactical
evaluations, though, we must consider how
some tactics might alleviate or exacerbate
perennial obstacles to CT efforts.
Operational Challenges to CT: Sorting Information,Coordinating IntelligenceEven the best conceived strategies may falter if
their implementation is impractical at the oper-
ational level. In the case of CT, the success of
any strategy meant to root out covert militant
groups will depend heavily on the availability
and quality of intelligence about their where-
abouts and plans. Unfortunately, the quality of
TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM
15
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
intelligence – its relevance to other information,
truth-value, and urgency – is often not evident
at the time it is received. A detainee’s report
of an impending attack could be lifesaving
information, but it could also be a prideful
bluff or an intentional misdirection intended
to divert intelligence agents’ time and resources.
Thus, a key challenge, or perhaps the key chal-
lenge, to CT operations is the analysis, sorting,
and prioritization of information of unknown
relevance for defeating terrorists. In the lan-
guage of ‘signal detection theory’ this is the
challenge of identifying a relevant ‘signal’ in the
midst of informational ‘noise’ (McNicol 2004).
Often, the relevance of incoming information
cannot be determined without reference to
information that is housed at some other U.S.
intelligence agency. The 9/11 Commission
highlighted this as a major impediment to pre-
venting the attacks of September 11th. They
concluded that the major failures leading up
to the attack stemmed most directly from poor
information coordination among the U.S.’s fif-
teen separate intelligence agencies and a failure
to imagine and prepare for unseen terrorist
tactics like the hijacking and weaponization
of airliners (Kean et al 2004, Chapter 11).
The commission made multiple recommenda-
tions, many of which were taken up by the
Bush Administration and have already been
discussed (Ibid., Chapter 12), but their most
urgent was the restructuring and streamlining
of the intelligence community. Though some
positive steps have been made in this direction,
a recent week-long Washington Post expose
of the U.S. intelligence community, “Top Secret
America,” paints a dismal picture of the pro-
gress (Priest and Arkin 2010).
Given the dependence of CT operations on
accurate intelligence that must be sorted and
prioritized by a limited number of human
analysts, and the poor state of intelligence coor-
dination in the U.S., any CT tactic exacerbating
the challenges of the intelligence community
should be regarded with suspicion by policy-
makers and the public. Intelligence agencies
are flooded with information to analyze –
the vast majority of it just informational white
noise. If some CT tactics are increasing the
volume of this noise or decreasing the volume
of terrorist signals, they may be more harmful
than helpful to U.S. CT missions.
TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM
16
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
EVALUATING CONTROVERSIAL COUNTERTERRORISM TACTICS
Below, we evaluate the efficacy of several
CT tactics. A tactic can be deemed effective if
it accomplishes its intended goals, aides a CT
strategy based in part on boosting the legiti-
macy of the U.S. relative to terrorists in the eyes
of bystander populations (outlined on page 11),
and does not exacerbate the intelligence chal-
lenges inherent to CT efforts.
Expanded Surveillance and Search ToolsWithin five weeks of the 9/11 terrorist attacks
Congress passed, and President Bush signed,
sweeping CT legislation known as the USA
PATRIOT Act (an acronym formed from the
bill’s official title: Uniting and Strengthening
America by Providing Appropriate Tools
Required to Intercept and Obstruct Terrorism).
Most of the provisions of the Act, and
some accompanying revisions to the Foreign
Intelligence Surveillance Act (FISA), are
considered uncontroversial, even among civil
liberties advocates. However, the act’s
expansion of some surveillance tools and the
lowering (or elimination) of the evidentiary
thresholds investigators must meet to surveil,
search, or seize the property of Americans have
been highly controversial since 9/11, inspiring
political, judicial, and legislative contests over
their constitutionality.
But questions of the expanded search and sur-
veillance powers’ efficacy should be of greatest
relevance to policymakers, security agencies,
civil liberties advocates, and the public. Has the
eased usage of National Security Letter (NSL),
roving wiretaps, “sneak and peek” searches,
suspicious activity reports (SARs), and FISA
surveillances helped law enforcement get infor-
mation critical to CT operations that they could
not have obtained using pre-9/11 standards and
procedures? Have these loosened standards gen-
erated unintended consequences that were
either productive or counterproductive to CT
operations? Here we review the historical role
of surveillance and judicial oversight, examine
the available evidence for and against the effi-
cacy of controversial PATRIOT Act and FISA
provisions, and consider the implications of
signal detection theory for expanded search and
surveillance tools.
1 . P L O T D E T E C T I O N
We begin our evaluation of the efficacy of
expanded search and surveillance tools with
an investigation into their ability to aide in the
detection and foiling of terrorist activities.
Since these PATRIOT Act provisions and FISA
revisions were passed ostensibly in response
to 9/11, we first ask whether they would have
helped prevent those attacks in particular.
In our review of news articles and intelligence
reports we found no credible evidence suggest-
ing that these provisions would have prevented
9/11 or even resulted in better intelligence
about the plot. The 9/11 Commission Report
blamed a range of factors for the attacks —
lack of imagination, lack of understanding
the danger, lack of information sharing, and
17
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
either. According to our analyses of news
accounts, FBI investigation reports, and recent
studies on foiled terrorist plots, all were broken
open due to the combination of well-deployed
undercover agents, information from citizen or
undercover informants, and tips from foreign
intelligence agencies (Difo 2010).10 Search and
surveillance warrants, whose usage was eased
by the PATRIOT Act, are only known to have
been used in two cases (those of the Portland
Seven, and Najibullah Zazi11). However, time-
lines of the investigations suggest that the
warrants investigators sought and attained
would have been authorized under pre-
PATRIOT standards. The Portland Seven had
startled a local citizen with their recreational
gun use, and the FBI used an undercover
informant to discover their interest in domestic
attacks. Based on that information, the FBI
attained surveillance warrants they would have
been able to attain even before the passage of
the PATRIOT Act.
In Najibullah Zazi’s case, too, investigators did
not need the PATRIOT Act to carry out their
investigations. Their surveillance of Zazi started
based on Pakistani intelligence reports that he
had visited with Al Qaeda operatives during his
trip to Peshawar, Pakistan in 2008 (Temple
Raston 2010) .That evidence would have been
sufficient for the FISA warrants they subse-
quently used to surveil him, with or without the
PATRIOT Act or post-9/11 amendments to
FISA. Similarly, the Joint Terrorism Task
Force’s ‘delayed notification’ or “sneek and
others — none of which included the idea that
excessively high warrant standards had blocked
the ability of the FBI or other agencies to
receive a search or surveillance warrant.9 The
Commission’s report listed ten “Operational
Opportunities” the intelligence agencies missed,
from the CIA’s failure to put Khalid al Mihdhar
on a watchlist in January 2000, to the FBI
Headquarter’s failure to act on urgent warnings
about Zacarias Moussaoui raised by the
Minneapolis FBI’s offices (Kean et al 2004,
355-6). In the case of the latter, FBI HQ refused
requests from the Minneapolis FBI field office
to seek a warrant from the Justice Department
for the search of Moussaoui’s computer
because it did not identify French intelligence,
suspicious flight school attendance, and other
evidence as a malicious pattern.
The preponderance of evidence suggests
that the greatest barrier to more effective
CT remains the operational challenges to
intelligence sharing, analysis, and “connecting
the dots” (what the 9/11 Commission called
“institutional imagination”). Thus, the 9/11
Commission recommended reorganizing and
centralizing the government’s fifteen or more
different intelligence agencies to promote
institutional imagination and efficacy, but
made no recommendation to expand search
or surveillance tools (Ibid. Chapter 12).
Furthermore, our investigation into plots foiled
since 9/11 uncovers no credible evidence that
the expansion of search and surveillance tools
resulted in the discovery of those activities
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
18
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
peek” search of his rental car would have been
permitted according to case law developed in
the 2nd and 9th Federal Circuits well before the
PATRIOT Act was even imagined.12 As Sam
Rascoff, former NYPD intelligence officer, put
it, “what’s striking about the Zazi case is not so
much that new tools were being used, but that
old tools were being used in a comprehensive
fashion, and that they were being stitched
together in a thoughtful, strategic way, so
that one tool naturally gave way to another”
(Temple Raston 2010).
Since 9/11, even as CT agents and agencies
have become more adept in their use of classic
investigatory tactics and more attuned to
patterns of suspicious behavior, they have still
failed to piece together clues in important cases.
But these failures have not been due to hurdles
posed by judicial oversight or excessively-high
warrant standards. British and U.S. intelligence
agencies who were tracking Nigerian national
Umar Farouk Abdulmutallab before he
attempted a jet plane bombing on Christmas
Day, 2009 were not impeded by high warrant
standards nor did they need PATRIOT Act
provisions to discover through an informant
(i.e., Abdulmutallab’s father) that he might be
involved in a terrorist plot. In Abdulmutallab’s
case, as with 9/11, intelligence officials simply
failed to put together various clues including
communications with American provocateur
Anwar al-Awlaki, a prior warning to the U.S.
embassy by Abdulmutallab’s father, and
intercepted Al Qaeda communications that a
Nigerian would be involved in a future attack.
2 . D ATA M I N I N G
Three weeks after the 9/11 attacks, as it became
apparent that many of the hijackers had lived
and trained in the United States, President
Bush signed an Executive Order making it
easier for the National Security Agency (NSA)
to listen in on communications between
U.S. citizens and foreign callers whom the NSA
“reasonably suspected” of terrorist involve-
ment. And, the executive order allowed
the NSA to operate these wiretaps without
warrants or judicial oversight (i.e. from Federal
Intelligence Surveillance Courts, FISCs).
The NSA had been fairly successful intercepting
the signals of known U.S. enemies during the
Cold War. Now it was being asked to identify
America's enemies among the billions of people
in and out of the U.S.
But this NSA-led “President’s Surveillance
Program” (PSP) met with significant chal-
lenges. First among them was the difficulty of
managing and sifting through the giant masses
of information (Bamford 2008). In response,
the NSA developed computer algorithms
to query data for transactions (e.g., fertilizer
purchases) and communications (e.g., with
Pakistanis) that set off “red flags” as defined by
human analysts. Emails containing suspicious
words and phrases like “bomb” and “conven-
tion center” might trigger a red flag. If enough
red flags were associated with a single person,
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
19
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
the NSA might single that individual out for
additional surveillance by human analysts.
All of this meant that the PSP’s information
trawling could only work if terrorists
communicated about their plans on the phone
or through email using very literal language.
But, as anyone who has ever discussed
a surprise party within earshot of the guest
of honor can attest, it is easy for callers to
substitute unrelated verbs and nouns for those
that might reveal their plot. Human languages
are famously subtle and labile when secrecy
is a factor in communication.
An evaluation of the PSP conducted by the
Offices of Inspector General (OIG) for the
Department of Defense (DOD), DOJ, CIA
and the Office of the Director of National
Intelligence (ODNI) is damning in its faint
praise of the program. Unable to cull together
hard evidence of the program’s efficacy, the
Inspector General’s report relied most heavily
on the testimony of intelligence officials and
analysts. According to the report: “NCTC
[National Counterterrorism Center] analysts
and ODNI personnel described the PSP infor-
mation as ‘one tool in the tool box’ or used
equivalent descriptions to explain their view
that the PSP information was not of greater
value than other sources of intelligence”
(Department of Defense et al 2009). “In sum,
the DOJ OIG found it difficult to assess or
quantify the overall effectiveness of the PSP
program as it relates to the FBI’s counterterror-
ism activities. However, based on the interviews
conducted and documents reviewed, the DOJ
OIG concluded that although PSP-derived
information had value in some counterterror-
ism investigations, it generally played a limited
role in the FBI’s overall counterterrorism
efforts” (Ibid.). The bias of interviewees,
though, may have contributed to suggestions
that the program was worth continuing despite
its undemonstrated value. FBI Director Robert
Mueller stated, for instance, “that he ‘would not
dismiss the potency of a program based on the
percentage of hits’” (Ibid.).
If the PSP was less effective than its proponents
hoped, other NSA programs seeking to predict
terror attacks faced more fundamental chal-
lenges. In a world where private firms were
collecting massive amounts of financial, tele-
phonic, and electronic transactional data, NSA
leadership and their funders in Congress sought
to use computers and algorithms to seek pat-
terns of terrorist behavior within those data.
The agency went to work compiling and index-
ing massive databases of existing intelligence
case files, financial institutions’ records of their
clients’ transactions, and telecommunications
companies’ records of clients’ phone calls,
emails, website visits, and text messages.
They installed splitters at fiber optic connection
points, effectively siphoning a mirror image
copy of all telephonic and electronic communi-
cations for further analysis and sorting
(Bamford 2008).
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
20
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
But, NSA efforts to pick out potential terrorists
using sophisticated data-mining techniques
were severely limited by the fact that there are
too few terrorist plots and associated behaviors
to identify a general pattern
of (electronic, transactional) ‘terrorist’ behavior.
The ‘machine learning’ that can make data-
mining effective in domains like credit scoring
requires vast stores of data on individual finan-
cial activity.
Machine learning works by comparing data on
a subject’s current financial history to the com-
plete history of many people who were
similarly situated at some point in their past.
Because the computer knows with certainty
how several people in socioeconomic situation
‘x’ performed financially at time t1, t2, t3, …
t99, it can later predict how a person in situa-
tion ‘x’ at time t32 will behave. However, for
the machine to learn what set of socioeconomic
variables actually predicts future behavior –
i.e. what ‘similarly situated’ means – it must
have a complete and thorough ‘training set’
of data on a number of people covering a wide
array of variables at least somewhat relevant to
their financial performance (National Research
Council 2008).
Because banks have kept so much data on their
customers’ transactional histories and those
data are easily linked to other data – e.g. home
ownership, occupation, number of children,
age, education, ethnicity, gender, etc. - the
‘training sets’ for financial competence are com-
prehensive in terms of variables, complete over
the financial lives of subjects, and relatively
accurate. As banks continue to accrue more
data, the software learns more and more about
how its predictions were right or wrong and
becomes even better at predicting financial out-
comes in the future.
When applied to the case of terrorism, the NSA
had hoped data-mining software relying on
machine learning would be able to predict who
will engage in terrorist activity weeks, months,
or even years before their attacks are scheduled.
But there simply are not enough data on terror-
ist activities to use the machine learning process
(Ibid.). Comprehensive data sets on terrorists’
activities prior to attacks only number in the
dozens. Programmers would need several hun-
dred cases, at minimum, for the machine
learning process to be helpful.
But even these data are not likely to be helpful.
More data about terrorist behaviors could be
added as plots unfold but there is little reason
to believe that terrorists openly engage in meas-
urable behaviors that are both substantially
related to terrorist activity (that could be used
to establish a terrorist ‘signal’) and are clearly
distinguishable from the common behaviors
(i.e. irrelevant informational ‘noise’) of billions
of non-terrorists. Before the 9/11 attacks, the
activities of the hijackers — renting apartments,
holding jobs, carrying passports, and buying car
insurance in their own names — all appeared
normal. Their phone numbers were in the local
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
21
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
phone book. Some of them even bought their
boxcutters at a Target store just down the street
from NSA headquarters. Even after 9/11, none
of these activities would seem suspicious. And
the most suspicious behavior — inquiring about
how to fly but not land passenger jet planes —
could only be noticed by human informants or
agents, not computers sifting through petabytes
of transactional data.
3 . FA L S E L E A D S
While unnecessary informational noise poses
a challenge to the detection of genuine terrorist
signals, false signals actually distract attention
and resources away from helpful CT efforts.
To prevent the pursuit of false leads, states –
for centuries – have regulated the ability
of law enforcement to conduct searches and
surveillance.13 If evidentiary thresholds for
attaining investigative warrants are set too low
(or eliminated entirely), agents may, intention-
ally or not, pursue more weak leads than they
would with stricter oversight. Expansive inves-
tigative powers threaten security and undermine
state legitimacy if they distract the attention
and resources of security agencies, encourage
the harassment of innocents, or allow the
guilty to go free.
Our review of news accounts and government
reports has uncovered evidence that expanded
search and surveillance tools after 9/11
increased informational noise and the pursuit
of false signals. PATRIOT ACT provisions
allowed the FBI to collect more and more
information about people without demonstrat-
ing sufficient (or in many cases, any) cause for
suspicion. Between the years 2000 and 2008,
the issuance of National Security Letters
(NSLs) — demands sent to companies to
secretly gather financial and communications
transactional information about individuals
without their knowledge — increased over five-
fold to 50,000 per year (Dept. of Justice 2007).14
The number of FISA warrants sought and
approved also doubled over the period to 2,400
(Electronic Privacy Info. Center 2008). And, the
number of Suspicious Activity Reports (SARs),
which are secret reports to the Treasury
Department made by U.S. banks about their
customers, grew six-fold to 1,250,000 by 2007
(Dep. of Treasury 2008). (Meanwhile, the
number of FBI agents working on terrorism
only doubled.)
With so much information being collected, one
might think that the number of terrorism cases
also increased dramatically over the period.
However, the number of cases prosecuted by
the DOJ dropped significantly from its post-
9/11 high of 355 in 2002, to 34 in 2008 (the
latest year for which data were available at the
time of printing). Those numbers may reflect
prosecutorial overzealousness in 2002 and/or
a steady decline in the number of individuals
engaged in terrorist activity over the period.
In any case, the enhanced information gather-
ing powers of the FBI did not seem to result
in higher quality case files for prosecution.
While in 2001, DOJ prosecutors declined only
33 percent of the terrorism cases the FBI
referred for prosecution, in 2002 that declina-
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
22
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
tion percentage rose to 54%. By 2006, the DOJ
rejected 87% of the terrorism cases the FBI
referred for prosecution (Transactional Records
Access Clearinghouse 2006).
These data plainly show that at the same time
investigators were collecting more information
they were also referring fewer cases to prosecu-
tors overall, and a much higher percentage of
those did not meet prosecutors’ standards.
While the Justice Department defends the use
of its expanded search and surveillance powers,
its Inspector General’s Office has also reported
on their limited effectiveness: “Many field
agents and Headquarters officials we inter-
viewed said it is difficult to isolate the
effectiveness of national security letters in the
context of a particular case” (Fine 2007-A, 45).
Indeed, responding to an earlier journalistic
investigation by Washington Post reporter Barton
Gellman, then Assistant FBI-Director, Michael
Mason could not recall a case in which NSLs
had been essential or dispositive. “I’d love to
have a made-for-Hollywood story, but I don’t
have one,” Mason said. “I am not even sure
such an example exists” (Gellman 2005).
The same can be said for controversial Section
215 of the PATRIOT Act, which expanded the
scope of FISA search warrants to “any given
thing” associated with a FISA investigation.
When Section 215 was reviewed by the DOJ
Inspector General, his report concluded, “We
found no instance where the information
obtained from a Section 215 order resulted in a
major case development such as the disruption
of a terrorist plot” (Fine 2007-B, 79). “Most
of the agents we interviewed said the records
obtained… did not contribute to the develop-
ment of additional investigative information”
but were useful for ruling out suspicions about
a person (Fine 2007-B, 67).
Some policymakers thought that lowering
evidentiary thresholds justifying search and
surveillance would free terrorism investigators
from wasting precious time seeking what they
judged to be excessive permission from judicial
authorities, arguing that in situations where
time is of the essence, judicial oversight could
put security at risk. But long before 9/11,
agents could request and receive warrants very
rapidly — within hours, not days — if they had
evidence suggesting that someone might be
involved in criminal activity. In emergency
situations, investigators could even set a wiretap
and then apply for its warrant later. In non-
emergency situations judicial oversight often
improves intelligence gathering by requiring
careful investigative work critical to winning
warrants and prosecuting cases. Contrary to the
conventional understanding that investigatory
oversight slows investigators, appropriate
judicial oversight reduces the distracting noise
of false leads, saves investigators the time
needed to rule out the guilt of thousands of
potential ‘suspects,’ and improves the quality
of intelligence.
The argument could be made that it is not pos-
sible to know the effects of expanded search
and surveillance tools because the valuable
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
23
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
intelligence and investigatory contributions
resulting from reduced standards are classified.
But if this argument were true, then only a
remarkable and highly improbable coincidence
(or some far-fetched conspiracy) could explain
how all available evidence about disrupted
plots – today known through news accounts
and court cases – demonstrates no enhanced
intelligence benefit from the expanded search
and surveillance powers.
Out of concern for civil liberties, Congress
required the Inspector General of the
Department of Justice to investigate potential
civil liberties abuses by investigators and placed
some restrictions on the use of NSLs when it
reauthorized the PATRIOT ACT in 2006.
The reports coming out of these inspections
confirmed that the number of actual prose-
cutions was dwarfed by the number of NSLs
issued and people affected — and that the
powers had been misused by the FBI. However,
given the evidence of their inefficacy and
counter-productivity lawmakers might also
attend to the potential security drawbacks of
NSLs and other expanded search and surveil-
lance powers even when they are not abused.
Ethnic/Religious andBehavioral ProfilingFollowing 9/11, authorities employed multiple
profiling tactics – like the FBI’s “Interview
Project,” Immigration and Customs
Enforcement’s “Special Registration”
program, and the Transportation Security
Administration’s Computer Assisted Passenger
Prescreening System and ‘behavioral’ profiling
tactics – in their attempts to home in on those
individuals most likely to carry out terrorist
attacks. The FBI’s “Interview Project” screened
tens of thousands of American citizens
identified as Muslim and/or Arab. The inter-
views could not be mandatory without violating
14th amendment protections against differential
treatment based on ethnicity or religion, but
many Muslim and Arab Americans complied
due to feelings of patriotism, obligation, and/or
intimidation.
The Immigration and Naturalization Services
(now Immigration and Customs Enforcement
or ICE) also required male immigrants from
Muslim majority countries to perform a
‘Special Registration,’ a process in which, over
several months in 2002 and 2003, immigration
personnel photographed, fingerprinted, and
interviewed more than 80,000 registrants.
Thousands of these men were deported for
minor immigration violations, usually visa over-
stays. The rest were placed on a sort of
probation requiring them to report to immigra-
tion authorities at least once per year and every
time they entered or exited the country,
changed jobs, changed addresses, or enrolled in
universities, etc. They were also required to
enter and exit the country only through desig-
nated airports or sea ports.15
The Department of Homeland Security’s
Transportation Security Administration (TSA)
also took action seeking to filter potential ter-
rorists from the rest of the population. The
agency had to be mindful of Department of
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
24
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
Justice protocols (based on the 14th amendment)
preventing involuntary ethnic/religious profil-
ing of American citizens, but it did employ a
Computer Assisted Passenger Prescreening
System (CAPPS) especially sensitive to those
who were traveling or had traveled to Arab-
or Muslim-majority countries. The effect of
CAPPS was to apply more stringent scrutiny to
travelers with Arab and/or Muslim heritage
while also comparing travelers’ names, financial
transactions, housing information, family con-
nections, travel destinations, contact telephone
numbers, seat assignments, dates of travel,
passport information, method of payment, and
amount of luggage to those of known terrorists
or terrorists scenarios defined by databases and
streaming intelligence reports. CAPPS (and its
second and third generation offspring) then
ranks passengers according to their likelihood
of being a terrorist. The top 5 percent or so
(the exact percentage is classified) are subjected
to higher levels of screening that can include
luggage searches, pat downs, additional screen-
ing, and/or brief interviews.
The TSA also employs behavioral profiling,
whereby agents seek to discover passenger nerv-
ousness, irritability, or other suspicious signs
that might indicate their intentions to commit
terrorism. The methods are reputed to be highly
effective in Israel, where the national airline, El
Al, despite receiving almost daily terror threats,
has not experienced a major attack in over three
decades. TSA’s use of behavioral profiling is
much less intensive than El Al’s. The latter
approach submits every passenger to a battery
of open-ended questions and psychological
evaluations. By contrast, TSA’s Screening
Passengers by Observation Techniques (SPOT)
program only closely questions the rare passen-
gers that agents deem suspicious. In practice,
probably owing to the human tendency to inter-
pret the behaviors of poorly understood
out-group members as 'exotic' (Tajfel 1982),
TSA agents, according to multiple anecdotal
accounts, have been prone to apply greater
scrutiny to Muslim, Arab, Sikh, and South-
Asian air passengers.
Given that the 19 airplane-hijacking suicide
bombers of 9/11 were all Muslim and most
were Arab (15 from Saudi Arabia, two from
the United Arab Emirates, one from Egypt,
and one from Lebanon), it was not entirely irra-
tional for security officials – fearing that other
terrorist cells might already be hiding in the
country – to focus their attention on the one in
100 Americans of Muslim of Arab descent
rather than on the entire population. In fact, the
case for profiling has always seemed common-
sensical: if police know the basic characteristics
of their suspects (height, weight, eye-color,
etc.), they should focus more attention on peo-
ple sharing those characteristics. By reducing
the number of people who must be questioned
or searched, investigators can boost the strength
of the ‘signal’ of terrorism and reduce the
‘noise’ from innocent populations.
1 . E T H N I C / R E L I G I O U S P R O F I L I N G
Despite the apparently sensible basis for
profiling, there is no evidence that U.S.
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
25
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
profiling policies have worked to catch terror-
ists. According to a 2003 Government
Accountability Office (GAO) Report on the
FBI’s ‘Interview Program,’ the FBI and DOJ
provided no specific evidence that the program
had generated any leads and over half of the
FBI agents the GAO spoke with “expressed
concerns about… the value of the responses
obtained in the interview project” (Government
Accountability Office 2003, pgs. 5-6). The
massive ‘Special Registration’ program of ICE
and DHS never captured any terrorists either.
After two years of cataloguing and interviewing
tens of thousands of immigrants and visa-hold-
ers the program was scaled-back (reducing
visitors’ reporting requirements) and re-named
“US-VISIT.” So far, there is no evidence of any
terrorist being caught in the act by the CAPPS
system either (or its second generation ‘CAPPS
II,’ or its third generation ‘Secure Flight’). And
while TSA’s behavioral profilers have suspected
and interviewed hundreds of thousands
of travelers, none of them were engaged in
terrorist activities.
Religious and ethnic profiling fails similarly to
data mining. There are simply too few terrorists
from which to generalize a useful profile.
While extremely few people are involved with
terrorism, millions of American citizens, resi-
dents, and visitors are law-abiding Muslims and
Arabs. A profiling policy that boosts the signal
of Muslims and Arabs does not significantly
boost the signal of terrorists, but instead
amplifies a slightly narrowed bandwidth of
informational noise representing Muslim and
Arab populations.
The case of Brandon Mayfield clearly illustrates
the poor outcomes generated by profiling based
on widespread characteristics like religion.
Mayfield, a Portland, Oregon attorney, was
investigated and jailed by the FBI for several
weeks on the grounds that: a) his fingerprints
were a partial-but-weak match with those left
by a Madrid Bombing suspect; and b) he had
converted to Islam several years prior. Despite
contravening objections and evidence provided
by Spanish intelligence, the FBI rushed
to judgment, obtained a series of FISA war-
rants and a “sneak and peek” warrant, entered
Mayfield’s home surreptitiously, took dozens
of photographs, scanned his hard-drives,
subpoenaed his phone and Internet records,
and eventually detained him for two weeks
while telling reporters that he was responsible
for the Madrid bombings of 2004. By the
time agents discovered Mayfield’s innocence,
thousands of investigator hours had been spent.
Mayfield sued and the government paid two
million dollars restitution to him in an out-of-
court settlement (Epps 2007).
Profiling not only produces ‘false positives,’ like
Mayfield; it may also generate ‘false negatives.’
The few terrorists able to pass through airport
screenings since 9/11 – failed “shoe bomber”
Richard Reid and would-be Christmas Day
bomber Umar Farouk Abdulmutallab –
illustrate how the policy may simply inspire
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
26
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
terrorist groups to shift the racial profiles of
their operatives. Shoe bomber Reid was
half-Caucasian, half-Jamaican, and a British
national. Farouk Abdulmutallab was African,
from Nigeria. Others, too, have shown the abil-
ity of terrorists to recruit outside phenotypical
stereotypes to avoid ethnic profiling, including:
Hispanic-American Jose Padilla, half-Pakistani,
half-American David Headley (who adopted
his mother’s Judeo-Christian name), white
Illinoisan Michael Finton, the home-schooled
Californian Adam Gadahn (AKA Abu Yahya),
Alabama-Native and former Junior Class High
School President Omar Hammami (AKA Abu
Mansoor Al-Amriki), Hispanic-American and
one-time Boy Scout Bryant Neal Vinas, and
blonde-haired, green-eyed suburbanite Colleen
LaRose (AKA Jihad Jane).
Some researchers predicted this shift in recruit-
ing strategy as early as 2002. Then, analysts
used statistical modeling to demonstrate how
any screening system applying heightened
scrutiny to some profiles and not others could
easily be overcome by terrorist organizations
(Chakrabati and Strauss 2002). By simply
sending their members on “dry run” flights
without any explosive devices, extremist groups
can determine who among their membership
can pass through the system unhassled.
Terrorists can reasonably infer that those who
consistently fail to trigger the system do not fit
the ‘suspect profile’ and are consequently ideal
candidates to execute attacks. By testing the
profile, Chakrabati and Strauss’ model showed,
terrorists can reverse engineer its components
in only two or three iterations and easily beat it
with non-Arab recruits. CAPPS profiles, there-
fore, can only outperform random-screening
procedures if terrorists are unwilling to test the
profiles more than a few times (Ibid.). To the
greatest extent possible, many security experts
conclude, searches of people and luggage
should occur without a discernible pattern that
can be reverse engineered.
Given the major weakness of a two-tiered
screening system relying on profiling, security
experts have also recommended applying the
highest available levels of screening to all pas-
sengers (Chakrabati and Strauss 2002; Schneier
2009). It was the universal screening for metals
and explosives that forced Richard Reid to
attempt to use an unreliable shoe bomb in late
2001. Eight years later, the requirements that
passengers submit their shoes to x-ray screening
and carry no more than 3 oz. of any liquid onto
a plane posed hurdles leading to the inadequate
construction of Abdulmutallab’s unreliable
undergarment bomb. These defenses, far more
than the extra-screening of behavioral profiling
or pat-down searches, have deterred or compli-
cated terrorist attacks. Enhancing screening for
all can provide heightened security without cre-
ating a loophole for terrorists who do not fit the
terrorist profile. If universal screening technolo-
gies are prohibitively expensive (e.g. if full body
scanners cannot be deployed in every airport),
evidence suggests that randomly selecting
passengers for heightened screening is more
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
27
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
effective at catching terrorists and deterring
them from attempting attacks than two-tiered
profiling (Chakrabati and Strauss 2002;
Schneier 2009).
2 . B E H AV I O R A L P R O F I L I N G
According to government reviews, news
reports, and psychological studies, behavioral
profiling does not appear to be any more effec-
tive than ethnic and religious profiling. The
TSA’s (Screening of Passengers by
Observational Techniques) SPOT program
attempts to recognize ‘malintent’ in travelers,
but it is based on the assumption that terrorists
will exhibit outwardly suspicious behavior that
can lead interrogators to further probe for signs
of duplicity. However, the peer-reviewed science
on ‘malintent’ detection – recently reviewed in
Nature – suggests rather strongly that it cannot
work. And like other profiling, the program has
resulted in no terrorist plot disruptions. Fewer
than 1 percent of the 272,000 individuals inter-
viewed by SPOT agents were arrested, all of
them for criminal activities or outstanding war-
rants. With a 99% false positive rate for any
criminal activity and 100% false positive rate
for terrorism, it seems there is little to recom-
mend the program.
Some claim that behavioral profiling has very
effectively secured Ben Gurion airport in Israel.
But officials there use so many layers of (time-
consuming) security that their overall success
cannot be attributed to a single factor. Terrorists
might worry about face-to-face interviews with
security officials who ask very specific but
open-ended questions, but they also must worry
about vehicle checkpoints on the way into the
airport, multiple layers of x-ray machines and
metal detectors, and sophisticated explosives-
detectors for checked luggage. The blanket
surveillance and questioning of air passengers –
and the very time-consuming focus on non-
Jewish passengers – might be one element in a
security system causing terrorists to seek easier
targets than the airport, but that does not mean
that the U.S.-style behavioral profiling of SPOT
can be effective. On the contrary, a side-by-side
comparison of the security systems seems
only to highlight the chasm between the two.
And as Israeli security consultants who once
hoped to scale the system up and bring it
to the U.S. point out, “Adopting the full Israeli
system won’t work, because of costs, time and
legal differences” (Guttman 2010). “People
simply won’t agree to spend all that time and
money” (Ibid.)
3 . A I R P O RT S E C U R I T Y E V O L U T I O N
The DHS’s most recent (Spring and Summer
2010) shifts in airport screening policy seem to
incorporate some awareness of the limitations
of profiling. According to news reports, the
latest screening system will include a higher
percentage of random-screening and some lay-
ers of security will remain ‘unseen,’ preventing
reverse engineering (Zeleny 2010). Both of
these modifications were recommended by
Chakrabati and Strauss, Bruce Schneier, and
other security analysts. In addition, TSA
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
28
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
reports it will be installing over 450 full-body
scanners across the country by the end of 2010,
950 by the end of 2011, and 1800 by the end of
2014, enough for over half the security lines in
the largest, highest priority airports. Eventually,
the machines will fully replace magnometers,
since the latter fail to detect non-metallic
weapons like ceramic knives or chemical explo-
sives.16 These changes appear to be steps in the
right direction, but DHS still apparently has
a good deal of faith in the value of profiling,
as they are investing incredible sums – $1.3
billion through 2020 (enough to buy 8,000 body
scanners) – in the development of an accurate
terrorist profile for their CAPPS filters
(Government Accountability Office 2010).
Those efforts, as discussed above in the section
on data mining, are likely to meet with contin-
ual frustration because data-driven solutions
to the challenge of finding terrorists rely on the
kinds of data that simply do not exist.
‘Enhanced InterrogationTechniques’ 17
After 9/11, popular narratives of terrorists por-
trayed them as extremely hardened fighters,
maybe even ‘unbreakable.’ Would they respond
favorably to the interrogation methods
developed by police to encourage criminals
to confess their crimes or turn on their
co-conspirators? Many who had the power to
control or influence policy believed they would
not. And given that hundreds or thousands
of lives might be at stake, they thought that
hardened terrorists might need to be softened
up with harsher treatment.
Thus, the Bush Administration and the CIA
General Counsel met with and orally requested
opinions from the Department of Justice on
how to legally widen the array of tools available
to interrogators throughout late 2001 and
2002.18 On August 1, 2002, Assistant Attorney
General of the United States, Jay Bybee, sent
memos to legal counsel for the White House
and CIA explaining the conditions under which
CIA interrogators could use techniques includ-
ing “(1) attention grasp, (2) walling, (3) facial
hold, (4) facial slap (insult slap), (5) cramped
confinement, (6) wall standing, (7) stress posi-
tions, (8) sleep deprivation, (9) insects placed in
a confinement box, and (10) the waterboard.”19
A supplementary memo, by Deputy Assistant
Attorney General John Yoo offered a legal
opinion explaining how and why the techniques
might not constitute ‘torture’ in violation of the
U.N. Convention Against Torture.
In both documents, Bybee and Yoo assert that
the methods probably do not cause long-term
physical or psychological damage if used in rea-
sonable doses. They also cite the fact that the
methods (except for ‘insects placed in a confine-
ment box’) are used on American military men
and women as a part of their Survival, Evasion,
Resistance and Escape (SERE) training. That
program was first developed out of a Korean
War training program designed to expose (and
hopefully inoculate) soldiers to the brutality
they might encounter if captured by the enemy.
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
29
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
It is unclear who broached the use of SERE
tactics on terrors suspects first – CIA Director
George Tenet and his number two John
McLaughlin, or top executives in the White
House. But the purpose of the tactics was clear:
to bring more tools to bear in the struggle to get
information out of terrorists. The tools were
thought to work in one of two ways. The most
physically coercive – like the slapping, shaking,
walling, cramped confinement, and waterboard-
ing – were designed to be so unpleasant as
to force cooperation. Stress positions, sleep
deprivation, and sensory disorientation were
intended to break detainees’ will from within
by causing them to harm themselves and
eventually slink into a state of psychological
despondency. Both classes of coercion were
intended to make it clear to detainees that they
were not in control of their bodies and they
could only experience relative calm and com-
fort by cooperating with their interrogators.
The long-time SERE trainers charged with
implementing the new interrogation regime,
James Mitchell and Bruce Jessen, believed that
the methods could induce a state of “learned
helplessness,” first described by experimental
psychologist Martin Seligman (Seligman 1972).
Seligman found that punishing dogs with
electric shock at random intervals, irrespective
of their behavior, created despondent psychosis
and pathological dependency. It is still not
entirely clear why Mitchell and Jessen believed
detainees in such mental states would produce
valuable information, but Seligman has
publicly distanced himself from that notion.
1 . E N H A N C E D I N T E R R O G AT I O N
A N D I N T E L L I G E N C E
In our review of declassified CIA documents,
intelligence reports, investigative journalistic
accounts, and even some interrogation
transcripts (see ‘Extended Bibliography’ for
a complete list) we uncovered no evidence
demonstrating that enhanced interrogation
techniques aided the thwarting of a single ter-
rorist plot. However, as reports of prisoner
abuse at Abu Ghraib, Guantanamo Bay, and
Bagram Air Force Base surfaced, Bush White
House and CIA officials, led by Vice President
Dick Cheney, were quick to assert that en-
hanced interrogation had saved lives. The
former vice president pointed to secret informa-
tion allegedly demonstrating the techniques had
worked. In 2009, he even publicly pressured the
CIA to declassify memos showing “what we
learned through the interrogation process and
what the consequences were for the country.”20
When the documents emerged, Cheney
claimed, “The documents released Monday
clearly demonstrate that the individuals sub-
jected to enhanced interrogation techniques
provided the bulk of intelligence we gained
about al Qaeda.” The statement was technically
true. The same people subjected to enhanced
interrogation techniques – Abu Zubaydah and
Khalid Sheikh Muhammed (KSM), in particu-
lar – were the same people who divulged a
great deal of information to authorities. The
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
30
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
only problem with Cheney’s story is that the
available evidence suggests the detainees were
most cooperative at the points in their interro-
gation when enhanced methods like
waterboarding were not being used.
Abu Zubaydah — Mitchell and Jessen’s first
‘learned helplessness’ case-study — is instruc-
tive. Operating in a secret CIA jail in Thailand,
the SERE trainers were allowed to direct the
second phase of the interrogation of Abu
Zubaydah – then thought by some to be third in
Al Qaeda’s chain of command. The first phase
had been carried out by FBI interrogators who
nursed Zubaydah back to health after he sus-
tained gunshot wounds during his capture and
used traditional rapport-building approaches
during his recovery (Isikoff 2009, April 25).
They gained his trust and drew vital informa-
tion about Al Qaeda’s personnel and how the
9/11 attacks had been planned and carried out
(Soufan 2009). He identified many Al Qaeda
operatives including KSM, the mastermind
behind 9/11 (CIA 2005). The former SERE-
trainers contracted by the CIA then took over,
claiming jurisdiction over the interrogations,
slamming Zubaydah against a flexible plywood
wall, slapping him, placing him in confinement
boxes, and waterboarding him for several
sleep-deprived weeks (Isikoff 2009). Finally,
unable to secure any further information, they
too determined that he must have already
offered his most valuable information to FBI
interrogators.
Though fewer details from KSM’s interrogation
have been made available to the public, there is
no credible evidence suggesting that any of the
information he provided was in response to
coercive interrogation practices. What is known
is that the CIA used a mix of coercive and rap-
port-based approaches and that he divulged his
most useful information to an interrogator,
Deuce Martinez, who eschewed the rougher
tactics. As New York Times correspondent, Scott
Shane, reports, “Mr. Martinez came in after the
rough stuff, the ultimate good cop with the clas-
sic skills: an unimposing presence, inexhaustible
patience, and a willingness to listen to the
gripes and musings of a pitiless killer in ram-
bling, imperfect English. He achieved a rapport
with Mr. Mohammed [KSM] that astonished
his fellow C.I.A. officers” (Shane 2008,
June 22). KSM even reportedly wrote poems
to Martinez’s wife as a show of respect
to Martinez. Over time the CIA transitioned
to interrogation that used much less physical
coercion and more rapport-based approaches.
Reports from KSM’s captors suggest that he
offered his most useful information when
interrogators appealed to his intellectual vanity.
Apparently intelligence agents flattered him
into giving multiple lectures about the structure
and operation of Al Qaeda – turning him into
a virtual CT consultant for the U.S.
A subsequent 2004 CIA Inspector General’s
report into enhanced interrogation techniques
used on Zubaydah and KSM and others con-
cluded that the coercive techniques had not
uncovered evidence of imminent plots. FBI
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
31
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Director Robert Mueller, in a December 2008
interview with Vanity Fair magazine, offered the
same conclusion on the techniques’ efficacy for
gaining crucial information (Rose 2008). The
one CIA operative who ever publicly stated that
the CIA’s “enhanced interrogation regime”
saved lives, retracted his story two years later.
John Kiriakou had said in an ABC interview
that one application of waterboarding to Abu
Zubaydah had produced actionable life-saving
intelligence. It later came out that Zubaydah
had been waterboarded 83 times, that Kiriakou
witnessed none of the interrogations, and that
he was repeating non-credible information he
had heard from others. He now concludes, “In
retrospect, it was a valuable lesson in how the
CIA uses the fine arts of deception even among
its own” (Stein 2010).
Claims that enhanced interrogation delivered
critical intelligence to the foiling of terrorist
plots have also been challenged by foreign intel-
ligence agencies. After a staff associate to
former Vice President Dick Cheney claimed in
a book that a 2006 Heathrow hijacking attempt
was disrupted by intelligence gathered from
‘enhanced interrogation,’ Peter Clarke, then-
head of Scotland Yard’s anti-terrorism division,
called his account “completely and utterly
wrong” because the “deduction that what was
being planned was an attack against airliners
was entirely based upon intelligence gathered
in the U.K.” (Mayer 2010).
2 . D E F I A N C E , L E A R N E D H E L P L E S S -
N E S S , A N D P O O R I N T E L L I G E N C E
Basic human psychology reveals why coercive
interrogation has not proven effective. Humans
may tend to seek pleasure and avoid pain, but
they also regularly sacrifice their pleasure —
even their lives — for what they view as higher
goals. Parents sacrifice for children, children for
parents, soldiers for nations, lovers for love,
artists for creation, and many for money. Even
so, reductive stimulus-response understandings
of human nature persist, leading to simplistic
interrogation strategies that overgeneralize
based on a partial understanding of human
behavior. Such simple and mechanical theories
of human motivation ignore much of the
knowledge accrued by the fields of psychology
and social psychology over the last several
decades, particularly the key distinction
between ‘intrinsic’ and ‘extrinsic’ motivation.
While external factors like rewards and
punishment can certainly have some effect on
peoples’ behaviors, internal, intrinsic motiva-
tions are at least as important in determining
their actions.
Irhabis are individuals invested in a powerful
narrative that casts them as warrior heroes in
a trans-worldly battle against injustice. Whether
as well-educated moderns or working-class
flunkies, they, like virtually all humans, are
driven to be the primary causal agents in their
lives (see Deci and Ryan 2004 for a thorough
review of ‘self-determination’ research). They
imagine themselves playing a decisive role in
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
32
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
history — providing a critical push to ridding
the Islamic world of western influence —
and effectively paving the way for an era of
peace and justice.
Given these powerful psychological motiva-
tions, it may be very difficult for interrogators
of Islamist extremists to devise any amount
of purely external incentive (pleasurable or
painful) capable of overriding a detainee’s
intrinsic motivation to control his own behavior
and protect secrets to which he and his com-
rades have mutually committed themselves.
‘Reactance’ and ‘defiance’ theories both show
that people tend to steel their wills against those
who attempt to constrain their freedom or harm
them (Brehm and Brehm 1981; Sherman 1993).
Abusing and threatening people – as ‘terror
management theory’ predicts – often causes
them to hold more firmly to their ideological
commitments (Solomon et al. 2004).
As for “learned helplessness,” the evidence sug-
gests it is counterproductive for interrogators
(Fein et al 2006). The abuse, according to trau-
matic stress theory, causes many people to
simply dissociate from the traumatic environ-
ment, psychologically withdrawing to the point
that they may lose their connection with reality
(Hobfoll 1991). Psychologists’ and militaries’
investigations into the efficacy of physically
coercive interrogation highlight these concerns.
The CIA’s own previous interrogation manuals,
published in 1963 and 1983, made much of the
fact that some defiant individuals are better able
to withstand pain than most civilians believe,
while other broken individuals may provide
unreliable information. “Use of force is a poor
technique,” the manual warned CIA agents,
“yields unreliable results, may damage subse-
quent collection efforts, and can induce the
source to say what he thinks the interrogator
wants to hear” (CIA 1963).
Physically coercive interrogation techniques
intended to incentivize cooperation often
appear only to escalate and prolong the battle
of wills between captors and detainees. Another
set of techniques was designed with the goal
of undermining the will of the detainee itself.
Throughout the 1950s and ‘60s, the CIA
researched the effects of sleep deprivation,
sensory disorientation (achieved by the constant
presence of absence of sensory stimuli), and
stress positions on detainees (McCoy 2006).
Because these techniques are also incredibly
uncomfortable and clearly adversarial, they still
inspire unhelpful defiance, but they also weaken
the individual psychologically in ways that
some hoped might attenuate that defiance. The
techniques also, though, alter subjects’ mental
states to the point where they become easily
confused and open to suggestion (CIA 1963),
psychotic break, hallucinations, and/or inability
to distinguish between true and false memories
(Mason and Brady 2009; Pilcher and Huffcutt
1996).21 Prolonged sleeplessness and a loose
connection to reality can easily result in false
confessions or false allegations against others
stemming from subjects’ confabulation of
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
33
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
reality with fantasy or the introduction of false
memories by interrogators.22
It was just such false information – delivered
under torturous duress by Ibn al-Shaykh al-Libi
– that supported the Bush administration’s erro-
neous conclusion that Iraq had been involved in
Al Qaeda’s 9/11 attacks. That connection was
strongly questioned by contemporary CIA and
Defense Intelligence Agency (DIA) reports and
later thoroughly debunked by a U.S. Senate
Select Committee and in various media (United
States Senate Select Committee on Intelligence
2006, pgs. 106-108; Kirk 2008).
Chasing the false leads of information given
under duress has apparently become a major
distraction at the FBI, adding to the signal
detection challenges already exacerbated by
other controversial CT tactics. A “seasoned
counterterrorist agent” reported to Vanity Fair’s
David Rose recently that “At least 30 percent
of the FBI’s time, maybe 50 percent, in coun-
terterrorism has been spent chasing leads
[produced by detainees under duress] that were
bullsh*t.” They try “to filter them. But that’s
ineffective, because there’s always that ‘What
if ?’ syndrome” (Rose 2008).
The self-defeating side-effects of enhanced
interrogation have been warned against by
history’s military leaders for hundreds of years.
“[P]utting men to the torture, is useless,”
Napoleon said. “The wretches say whatever
comes into their heads and whatever they think
one wants to believe.” Recently, China banned
the practice after reports revealed that it had led
to false confessions, the executions of
innocents and, conversely, freedom for the
guilty (Jacobs 2010).
3 . THE TICKING TIME BOMB SCENARIO
What about the “ticking time-bomb” scenario
where 1) a nuclear bomb is armed in a major
city; 2) it is scheduled to detonate within 24
hours; 3) security personnel have apprehended
a suspect who they believe knows about the
location of the bomb; and 4) they know that he
knows this potentially life-saving information?
The ticking time bomb thought experiment is
based on no confirmed incident in history
(Scheppelle 2005) but rather an extreme hypo-
thetical scenario designed by torture apologists
(and promoted by the popular television show
‘24’) to elicit the acknowledgement that in
some situations enhanced interrogation could
be justified. But such a conclusion rests on
an assumption — that the suspect would con-
fess rather than become defiant in the face of
torture — which psychological and empirical
evidence suggests is incorrect. KSM was water-
boarded 183 times over a one month period
without giving helpful information to interroga-
tors (Shane 2009). The ticking time bomb
would have exploded 29 days earlier — clearly,
a faster solution would be needed.
Moreover, the limited temporal window of the
ticking time-bomb scenario would only seem to
work in terrorists’ favor. In a scenario in which
a terrorist suspect’s secret knowledge is only rel-
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
34
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
evant for 24 hours (or, in the case of improvised
explosive devices, some matter of days), the
intransigent detainee only needs to remain defi-
ant for a short period to realize his mission.
4 . F R O M S U S P E C T S T O I N F O R M A N T S
Putting detainees through a psychological
ordeal might, in theory, “soften up” terrorists so
that they can more easily be “broken.” But
there is no evidence that “breaking” detainees
produces helpful intelligence anyway. The best
intelligence appears to come from suspects who
have been “turned” into informants through
skillful interrogations relying on a rapport
between interrogators and detainees (B’Tselem
2000, 51). Rapport-based approaches seek to
uncover and leverage detainee’s internal
motivations to glory, recognition, power, and
survival, without emphasizing and exacerbating
an adversarial relationship. Skilled interrogators
empathize with their subject and appeal to
his vanity, his self-interest, and his love of his
family. They sometimes use deception to trick
him into believing that talking will help him
or use trusted religious clerics or family mem-
bers to seek the subject’s cooperation (among
other approaches). Often, as discussed later,
it is the (even illusory) trust developed through
rapport approaches that serves as the founda-
tion of plea settlements delivering troves of
useful intelligence.
These more sophisticated interrogation tech-
niques rolled up Zarqawi’s terrorist network in
Iraq. One man providing life-saving informa-
tion was promised help with a divorce from a
shameful marriage and a chance for recon-
ciliation with his first wife (Alexander 2008,
Chapters 10-11). Another was promised that his
son would be treated to a fair trial instead of
being tried by his enemies (Ibid., Chapter 21).
One most difficult subject of the interrogations
in Iraq was a man who had offered no informa-
tion to an inexperienced interrogator using an
adversarial approach. But when he was fooled
into accepting a bogus deal that would have
made him a powerful man in post-occupation
Iraq, he revealed information leading directly to
Zarqawi (Ibid., Chapters 25-30). This may have
been an anomalous case, however, since expert
interrogators often complain that coercive inter-
rogation tactics “poison the well,” destroying
the prospect of turning suspects into informers
(Alexander 2008). This is what happened in
Zubaydah’s case, according to FBI interrogator
Ali Soufan, who said, “Abu Zubaydah was
making progress before torture techniques [were
used]” (Soufan, 2009).
Rapport-based approaches, while they require
interrogators with keen social skills, have
proven themselves highly effective, generating
large amounts of valuable information about
terrorist networks. Despite the common misper-
ception that terrorists are too ‘hardened’ to
respond to anything but violence, many still
have connections to family and friends that they
care about, ambitions they wish to fulfill, and
egos that can lead them to speak more openly
than they intend when they are in the hands of
a skilled interrogator.
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
35
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Detention and Prosecution of Terrorism SuspectsTwo months after 9/11, President George W.
Bush issued an executive order asserting his
power to detain certain terrorism suspects as
‘unlawful combatants’ who, as neither criminals
nor prisoners of war, were not subject to the
detention and prosecution standards defined for
either. Instead, these “combatants” would be
tried in the first U.S. Military Tribunals since
World War II. They could be detained preven-
tatively and indefinitely without rights to full
due process. These were some of the most con-
troversial CT measures of the post-9/11 period.
First instituted by President Bush’s Executive
Order of 2002 and then ratified by Congress in
the 2005 Military Commissions Act, military
tribunals also permitted the use of hearsay evi-
dence and testimony acquired under enhanced
interrogation — evidence civilian courts sup-
press (though these evidentiary standards for
military commissions were revised to align
more closely with Article III courts in 2009).
Today, the Obama administration is deciding
whether and how to prosecute the remaining
175 detainees at Guantanamo Bay military
prison, a focal point for much of the detention
controversy. Pressure from several Senators and
some 9/11 victims’ families motivated Attorney
General Eric Holder to back down from his
plans to try alleged 9/11 conspirators in
Manhattan. Opposition was based partly on
public safety concerns and cost and partly on
the assumption that a military tribunal
was more likely to deliver a conviction than
a civilian criminal trial. And today the
Administration is considering supporting legis-
lation that would remove ‘Miranda’ protocols
requiring law enforcement to inform terrorism
suspects of their right to an attorney. The unex-
amined assumption behind such a proposal is
that not having an attorney will better motivate
suspects to confess and become an informant.
While there has been considerable debate over
the legality of preventative detention (which,
for this paper’s purposes, we define broadly
as the non-battlefield detention of a person
despite a lack of evidence sufficient to charge
and hold him/her with a terrorism-related
crime) and trying terrorism suspects in military
rather than civilian courts, there has been less
discussion of these tactics’ efficacy for prevent-
ing, reducing, or ending terrorism. Their
efficacy for combating terrorism cannot be
measured by simply counting increased deten-
tions or convictions since lowered evidentiary
standards could simply produce greater counts
of detained innocents while the guilty go
unpunished. Instead, lowered evidentiary thresh-
olds for detention and prosecution must be
evaluated in terms of their ability to accurately
identify and prosecute the genuinely guilty.
Altered due process standards and trial venues
must also be evaluated for their ability to deliver
good intelligence to security agencies while
also preventing important state security secrets
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
36
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
from becoming known by the state’s enemies.
And finally, we must evaluate whether lower
evidentiary standards for detention and prose-
cution increase or decrease the legitimacy of
the U.S. and its allies relative to the legitimacy
of its enemies. Effective justice processes must
increase the motivation of individuals here or
abroad to assist in CT efforts, and decrease the
motivation of individuals to tacitly or actively
support terrorist activity.
1 . D E L I V E R I N G J U S T I C E
Our review of indictment and prosecutions sta-
tistics for military tribunals and Article III
civilian courts (e.g., federal district courts,
courts of appeals, and the Supreme Court)
shows that the latter venues have hosted orders
of magnitude more terrorism cases and thus
have produced many more terrorism convic-
tions. Between September 11, 2001 and
September 11, 2008, the Department of Justice
has resolved 593 “terrorism-related” cases in
Article III courts, winning convictions in 523
cases (by trial or plea). Of those convictions,
190 were of individuals associated with militant
groups like Al Qaeda.23 Military courts, by con-
trast, convicted just three people involved in
terrorism over the same period.24 Though the
very low sample size for cases by military tri-
bunals challenges efforts to compare the venues,
we can at least conclude that civilian judges and
prosecutors handling terrorism cases are more
experienced than their counterparts in relatively
untested military tribunals.
Some, even without substantial data, argue
that trying suspected terrorists in military rather
than criminal courts increases the chances
of conviction. This might have been the case
during the period from 2001 to 2009 when
Military Commissions admitted statements
made under duress and the testimony of
hearsay witnesses. Then, a suspect might be
convicted because some other detainee seeking
to end a coercive interrogation falsely accused
him of Al Qaeda ties.25 But easing such convic-
tions does not necessarily secure better justice,
just more convictions.
The exceptional justice processes applied to ter-
ror suspects during and after the invasion of
Afghanistan resulted, in part, from the fact that
they were captured in a unique environment
akin to a warzone but hardly resembling the
atmosphere imagined by the drafters of the
Geneva conventions. There was some legal
ambiguity about how the U.S. should proceed.
While The Red Cross and other human rights
organization interpreted the Geneva conven-
tions regarding detainee treatment as applying
to any and all combatants, members of the
Bush administration rejected this notion. They
interpreted the conventions to mean that they
were under no obligation to treat prisoners
detained in Afghanistan as ‘prisoners of war,’
citing the fact that they were not operating
according to rules of war requiring them to
fight openly as uniformed soldiers. Neither,
decision makers in Washington thought, was
the U.S. obliged to treat them as regular
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
37
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
American criminal suspects since they were
non-citizen combatants fighting against the U.S.
in a foreign land.
That murky legal environment was anomalous,
though, and could never serve as the model for
detaining and prosecuting terrorism suspects.
Very rarely do governments meet terrorists on
open fields of battle. Instead, they track down
terror suspects, investigate and surveil them,
and finally arrest them on criminal terrorism
charges. The situation in Afghanistan was
unique because a semi-sovereign government
of guerrilla fighters, the Taliban, was providing
safe haven for Al Qaeda’s training camps. Even
today, as the U.S. military fights the same com-
bination of guerrilla warriors and terrorists, it
uses better-formalized detention procedures in
Afghanistan and prosecutes the vast majority of
its cases through the Afghan judicial system. In
2001 and 2002, however, these procedures were
not in place. Thus, in addition to capturing
many Al Qaeda and Taliban fighters, Coalition
forces also detained scores of farmers and by-
standers. Other future Guantanamo detainees
were turned over to the U.S. by the Pakistani
government and bounty hunters, who were,
in some cases, more motivated to dispatch with
tribal rivals than deliver Al Qaeda leaders.
Prosecuting terrorist suspects captured in
murky situations by Coalition soldiers
or Pakistani bounty hunters, not experienced
police investigators, is qualitatively different
from prosecuting terrorism suspects such as
the would-be New York subway bomber, the
would-be Times Square bomber, or the would-
be Christmas day bomber. The guilt of the
latter terror suspects, like the guilt of terror
suspects tracked down by experienced investiga-
tors – is usually easily demonstrable even by the
evidentiary standards of traditional criminal
courts. The guilt of the former can be declared
or asserted, but rarely proven, since little evi-
dence rules out the possibility that they were
simply in the wrong place at the wrong time.
Convictions based on such slim evidence can-
not be counted as effective counterterrorism
since they may only imprison innocents.
Much of some policymakers’ and commenta-
tors’ opposition to holding civilian trials
for 9/11 conspirators has been driven by
concern that criminal trials mete out more
lenient sentences than military tribunals. But
this assumption, too, appears to be incorrect
(Gude 2010). The military officers who com-
prise military tribunals’ juries understand the
“fog of war” better than civilians and may be
more discerning between hard-core terrorists
and their hapless accomplices – and more sym-
pathetic to the latter. Such a notion may cut
against popular intuition, but recent sentences
delivered by military tribunals warrant observa-
tion. Osama bin Laden’s driver, Salim Ahmed
Hamdan — in the first military commission
since World War II — was sentenced by a jury
of military officers to just five and a half years
in prison, not the thirty years requested by pros-
ecutors. (Having already served most of those
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
38
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
years, Hamdan was free by the end of 2008.)
A similarly short sentence was delivered for
David Hicks. Both men are walking free today.
While the sample size of military convictions
is not large enough to analyze quantitatively,
the terrorism suspects convicted by military
tribunal received sentences much shorter than
those delivered by Article III Courts for compa-
rable crimes.26
2 . I N T E L L I G E N C E
Concern about trying terror suspects in criminal
courts has also focused on the risk of intelli-
gence leaks (Yoo 2009), but there exists no
evidence demonstrating that Article III courts
are a greater threat to government secrets than
military courts. In 1980, Congress passed and
the president signed into law the Classified
Information Procedures Act (CIPA) to guard
against intelligence-leaking during trials. CIPA
allows prosecutors to call a pre-trial conference
with the court and the defense to hammer out
what information should be considered secret,
and how all parties can effectively talk around
it during public proceedings.27 If the defen-
dants attempt to contravene the pre-trial
classified information guidelines set out by the
court, they can be promptly silenced and held
in contempt of court.
Some have argued that indefinite detention and
denial of the right to counsel (such as through
exemptions to Miranda rights) will result in
terrorist suspects providing more and better
intelligence sooner than they would if suspects
had the right to habeas corpus and to legal
counsel. Suspects, this line of reasoning goes,
will be more likely to confess, share informa-
tion, and otherwise provide good intelligence
to law enforcement if an attorney is not present
to counsel them. And if suspects have no
prospect of appealing their sentence (through
a habeas corpus petition), the thinking goes,
they will be more likely to confess than if their
case can be appealed.
However, there is good reason to believe that
terror suspects are more likely to cooperate with
authorities if they have attorneys to help them
negotiate a cooperation agreement. In exchange
for helpful information, the state might agree
to forego the death penalty, keep humiliating
information about the detainee from the public,
offer better prison conditions, or not deport
an innocent family member. Without a defense
attorney to negotiate such an exchange,
terrorist suspects may remain in a strictly
antagonistic posture with the state. Court
records and news accounts show that a number
of terror suspects have entered into such
cooperative bargains on the advice of their
attorneys. Bryant Neal Vinas, convicted of
a plot to bomb Penn Station in New York City,
agreed to provide information and act as key
prosecution witness in two terrorism trials in
Europe. David Headley, to avoid extradition
to India, Pakistan, or Denmark, pled guilty
to charges that he conspired to attack a
Danish newspaper that ran cartoons satirizing
the Prophet Mohammed. Other instances
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
39
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
of cooperation include Ahmed Ressam, the
would-be “Millennium Bomber,” who offered
copious and invaluable intelligence to security
agents in his attempt to reduce his sentence.
Henry E. Klingeman, a former federal prosecu-
tor who defended Hemant Lakhani advises
terrorism clients in clear terms, “Your defense
here is to get a plea bargain to avoid a life sen-
tence. There is no way you try this case and
win” (Ryan 2010, June 10).
3 . T H E D I S C U R S I V E S T R U G G L E
Lawyers can be so helpful for gaining the coop-
eration of suspects precisely because their
clients are usually more focused on their image
as holy warriors than on how they can help the
state and themselves through cooperation.
Many times, the capture of a terrorist suspect
only represents a shift from violent struggle
with the state to symbolic struggle with the
state. Several terror suspects, consistent with
the deviance and labeling theory of sociologist
Howard Becker (1963) embrace the status
of ‘warrior’ that military commissions confer.
They reject comparisons to petty criminals
implied by trial in traditional criminal courts,
seek to fire their attorneys, and yearn for
symbolic or real martyrdom via military
commission. KSM, most famously, has made
it clear that he would prefer ‘martyrdom’
before a military tribunal over a civilian trial
(Glaberson 2008).
KSM’s declaration was part of a larger commu-
nications strategy seeking to show the state’s
EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS
CT efforts to be hypocritical and unjust, and
irhabis’ efforts to identify themselves with a
steadily escalating decades-long war for a more
just world. On the day of his sentencing, the
would-be Times Square bomber Faisal Shahzad
also recited familiar aspects of this irhabi
narrative, declaring himself a “Muslim soldier”
fighting to defend Muslim people and Muslim
lands. When pressed by the judge as to his
willingness to kill women and children, he
replied flatly, “It’s a war” (Weiser and
Moynihan 2010, June 21).
Martial rhetoric was difficult for the U.S. to
avoid immediately after the 9/11 attacks, which
were experienced by the public, commentators,
and policymakers as acts of war. But, martial
legal classifications feed irhabis’ narrative of
a holy war against U.S. tyranny. That framing
of the struggle has had the unintended conse-
quence of reinforcing the image terrorists create
for themselves and deploy in their recruitment
campaigns.
40
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
Before the 9/11 Commission issued its findings,
policymakers widely assumed that law enforce-
ment and security personnel needed more
powers to prevent terrorist acts. By the end of
2001, they were granted those powers. But the
assumption that law enforcement and security
agencies had been previously constrained is not
supported by evidence available to the public.
According to the government’s own investiga-
tions, the 9/11 attacks resulted from security
agencies’ inability to piece together evidence
of terrorist plotting in Phoenix, Minneapolis,
San Diego, and other cities. Law enforcement
and Intelligence did not need legislation
expanding surveillance powers so they could
gather more information. Rather, they needed
better methods for sharing and evaluating the
intelligence they already had.
The emotionalism of the post 9/11 period has
dissipated sufficiently for policymakers to take
a cold hard look at the evidence for and against
various CT tactics. These tactics should be
disentangled from one another so they can
be evaluated separately. At the same time, CT
efficacy must always be evaluated in context
to ensure not only that it is harmonious with
broader CT strategy but also that it does not
exacerbate the significant signal detection
challenges faced by the intelligence community.
The controversial CT tactics we have reviewed
often undermine the state’s attempts to win
the struggle for legitimacy and the cooperation
of bystanders, play into terrorists’ recruitment
narratives, and produce more informational
noise drowning out terrorists’ signals.
Given the weight of evidence against the
effectiveness of controversial tactics, the people
promoting their use should bear the burden
of proving their efficacy. Unless and until that
happens (and we have not seen good evidence
that it can or will), officials interested in provid-
ing effective security for their people should
forgo the tactics' use and invest their energies
in developing other practices able to improve
CT outcomes.
DISCUSSION AND CONCLUSIONS
41
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
1. THE FEDERAL GOVERNMENT SHOULD DEVELOP STANDARD METRICS FOR EVALUATING INDIVIDUAL
COUNTERTERRORISM TACTICS AND ACT ON THE RECOMMENDATIONS OF THOSE EVALUATIONS.
For U.S. CT agencies to effectively design and adjust CT approaches effective against an evolv-
ing terrorist threat, they must engage in constant, rigorous evalution. The Government
Performance and Results Act requires all agencies of the U.S. government to set standards and
measurements for their successful performance. But there is no consistent ongoing evaluation
of individual CT tactics for their efficacy. Many evaluations – like the DOJ Inspector General's
review of the FBI's use of more accessible search and surveillance tools -- focus more on the
legality of tactics than their efficacy. In other cases, negative reviews are ignored. The NSA
continues funding its data-mining projects despite the National Academies’ of Science
considered conclusion that they cannot work. And TSA continues SPOT despite GAO reports
on its dubious efficacy.
2. INDEPENDENT INSTITUTIONS SHOULD REGULARLY CONVENE CT EXPERTS TO CREATE RIGOROUS,
PEER-DRIVEN PROCESSES TO EVALUATE CT TACTICS AND STRATEGY AND CREATE EVALUATION
METRICS. The most salient feature of contemporary evaluations of CT tactics is how few there
are, despite the central role they must play in preventing terrorism. Security agencies and/or
charitable foundations should regularly convene independent academics, think tanks, and
government security analysts to discuss and debate critical CT questions. This effort should
also result in greater peer review and perhaps even a refereed journal where these discussions
and debates can take place.
3. POLICYMAKERS AND SECURITY AGENCIES SHOULD UNDERSTAND THE CENTRAL ROLE THAT
COOPERATIVE COMMUNITY RELATIONS PLAY IN UNDERMINING TERRORISTS’ RECRUITMENT
EFFORTS, DISRUPTING THEIR NETWORKS, AND FOILING THEIR PLANS, AND SEEK POLICIES
THAT INCREASE THE LEGITIMACY OF U.S. COUNTERTERRORISM AND MOTIVATE INDIVIDUALS TO
COME FORWARD WITH HELPFUL INFORMATION. Since 9/11, Muslim and Arab Americans have
overwhelmingly cooperated with federal security agencies seeking to investigate and disrupt
plots. But if the state continues to regard these communities with suspicion, it risks escalating
the unhelpful stereotyping of patriotic American citizens and alienating or chilling the support
of perhaps our greatest intelligence asset when it comes to domestic CT security. Many U.S.
government security agencies and officials now seem to appreciate the security threat posed
by the deteriorating relations with affected communities, but our review highlights the need
for more, and more productive, outreach efforts.
RECOMMENDATIONS
42
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
4. LAW ENFORCEMENT AND INTELLIGENCE AGENCIES NEED TO RESPOND TO THE POOR SECURITY
OUTCOMES OF CURRENT SURVEILLANCE STANDARDS BY ESTABLISHING MORE RIGOROUS
PROTOCOLS FOR CARRYING FORWARD INVESTIGATIONS. Chasing false leads distracts intelligence
agencies from the process of “connecting the dots” so often cited as a challenge for them.
Since expanded surveillance tools allow law enforcement and intelligence agencies to investigate
people without an adequate evidentiary predicate, they need to discipline themselves by setting
better surveillance standards within their organizations. In a similar vein, programs that inun-
date intelligence analysts with information but have shown little success, such as the NSA’s
data-mining efforts, should be terminated so that they no longer distract resources and attention
from proven CT methods.
5. MORE UNIVERSAL SCREENING METHODS SHOULD BE IMPLEMENTED IN AIRPORTS, GIVEN THEIR
EFFECTIVENESS SINCE 9/11 IN PREVENTING ATTACKS. Given that terrorist groups have avoided
heightened airport screening by recruiting new members who do not fit CAPPS (or ‘Secure
Flight’) profiles, DHS and the TSA need to universally apply the highest available levels of
screening to all passengers. Universal screening for liquids and metal have already made it more
difficult for terrorists to either bring, or effectively detonate, bombs on planes, as the botched
bombing attempts of the shoe bomber and the Christmas Day bomber demonstrate. Minimally-
invasive full body scanners can pose an even more effective barrier. TSA should install these
scanners as quickly as possible and also consider greater implementation of randomized and
unseen screening methods – which cannot be reverse-engineered by terrorists – if they continue
to distinguish passengers for secondary screening.
6. IMPROVE INTERROGATION PROTOCOLS THROUGH RESEARCH AND TRAINING PROGRAMS.
Interrogation is a critical opportunity for intelligence-gathering, but it remains more of an art
than a science despite great improvements in understanding human motivation over the last
thirty years. The present administration has taken an important step forward by creating
a High-Value Interrogation Group, a team of highly-trained interrogators, to be used with high-
value detainees. However, we recommend further steps like those proposed by Air Force reserve
Colonel and former interrogator in Iraq, Stephen Kleinmann. He has called for “a new intelli-
gence agency or sub-agency devoted solely to interrogation — sponsoring research, conducting
training and building a team of sophisticated interrogators with linguistic and psychological
skills” (Shane 2008, March 9) (emphasis added).
D ISCUSS ION AND CONCLUS IONS
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
43
We wish to thank the many scholars,
researchers, journalists, and government
analysts whose work we have drawn on in
completing this research. This paper was
possible thanks to the generous support of
the Lotus Foundation and the Open Society
Institute. We thank them not only for funding
this research but also for encouraging our
independence in the process. We would also
like to thank our many colleagues who have
offered us comments and criticisms that have
helped to improve the paper. We are especially
indebted to Mike German, Martha Crenshaw,
Tom Parker, Gary Ackerman, Lisa Graves,
Graham Allison, Kate Martin, Peter Bergen,
Heather Hurlburt, Matt Bennett, Jameel Jaffer,
Karen Greenberg, Suzanne Spaulding,
Joshua Dratel and Anthony Romero for their
helpful engagement. While we very much
appreciate their counsel and collegiality,
we, of course, take full responsibility for any
errors in the work.
AUTHORS’ NOTE
Alexander, Matthew. 2008. How to Break a Terrorist : the U.S. interrogators who used
brains, not brutality, to take down the deadliest man in Iraq. 1st ed. New York:
Free Press.
Art, Robert and Louise Richardson, eds. 2007. Democracy and counterterrorism :
lessons from the past. Washington D.C.: United States Institute of Peace Press.
Asharq Alawsat. 2010. “Al-Qaeda Appeals to Sympathizers for Donations.” August 12,
2010. http://www.asharq-e.com/news.asp?section=1&id=21931
Bamford, James. 2008. The Shadow Factory: The Ultra-Secret NSA from 9/11
to the Eavesdropping on America. Doubleday.
Bamford and PBS:Nova. 2009. “The Spy Factory.” Public Broadcasting Service.
February 3, 2009. http://www.pbs.org/wgbh/nova/military/spy-factory.html
Becker, Howard. 1963. Outsiders. Free Press. New York, NY.
Bergen, Peter and Bruce Hoffman. 2010. “Assessing the Terrorist Threat: A Report of
the Bipartisan Policy Center’s National Security Preparedness Group.” Bipartisan
Policy Center. Washington, D.C.
Brehm, S. S, and J. W Brehm. 1981. Psychological reactance: A theory of freedom and
control. New York: Academic Press.
B’Tselem. 2000. “Position Paper: Legislation Allowing the Use of Physical Force and
Mental Coercion in Interrogations by the General Security Service.” January.
http://www.btselem.org/English/Publications/Index.asp?YF=2000&image.x=10&i
mage.y=10
Central Intelligence Agency. 1963. KUBARK: Counterintelligence Interrogation-
July 1963.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB122/CIA%20Kubark%201-
60.pdf
Central Intelligence Agency. 2005. “Detainee Reporting Pivotal for the War Against
Al-Qa’ida”. June 3.
Chakrabarti, Samidh and Aaron Strauss. 2002. “Carnival Booth” Law and Ethics On The
Electronic Frontier. Massachusetts Institute of Technology Computer Science
and Artificial Intelligence Laboratory Student Papers Spring 2002. Chapter 3.1.
May 16, 2002. http://groups.csail.mit.edu/mac/classes/6.805/student-
papers/spring02-papers/caps.htm#_Toc9406731
Charters, David. 1994. The Deadly Sin of Terrorism : its effect on democracy and civil
liberty in six countries. Westport Conn.: Greenwood Press.
Crenshaw, Martha. 2009. “Evaluating the Effectiveness of Counterterrorism.” Prepared
for the International Studies Association 50th Annual Convention, New York,
New York, February 15-18, 2009.
Cronin, Audrey. 2009. How Terrorism Ends : understanding the decline and demise of
terrorist campaigns. Princeton: Princeton University Press.
Deci, E.L. and R.M. Ryan. 2004. Handbook of Self-Determination Research. Rochester:
University of Rochester Press.
Department of Defense, Department of Justice, Central Intelligence Agency,
National Security Agency, Office of the Director of National Intelligence. 2009.
Offices of Inspector General. “Unclassified Report on the President’s
Surveillance Program.” Washington D.C. July 10, 2009.
Department of Justice. 2007 Office of Inspector General. “A Review of the Federal
Bureau of Investigation’s Use of National Security Letters.” March 2007.
Http://www.usdoj.gov/oig/special/s0703a/final.pdf
Electronic Privacy Information Center. “Foreign Intelligence Surveillance Act Orders,
1979-2007.” Retrieved December 1, 2008.
http://epic.org/privacy/wiretap/stats/fisa_stats.html#footnote12
44
Epps, Garrett. “Vengeance is Brandon Mayfield’s.” October 3, 2007. Salon.com.
http://dir.salon.com/story/news/feature/2007/10/03/brandon_mayfield/index.html
Fein, Robert, Paul Lehner, and Bryan Vossekuil. 2006. Educing Information:
Science and Art – Foundations for the Future. National Defense Inteligence
College Press.
Fine, Glenn. 2007-A. “A Review of the Federal Bureau of Investigation’s Use of National
Security Letters.” Office of the Inspector General. Department of Justice. March
2007. Washington, D.C.
Fine, Glenn. 2007-B. “A Review of the Federal Bureau of Investigation’s Use of Section
215 Orders for Business Records.” Office of the Inspector General. Department
of Justice. March 2007. Washington, D.C.
Gellman, Barton. 2005. “The FBI’s Secret Scrutiny.” The Washington Post.
November 6, 2005.
Glaberson, William. 2008. “5 Charged in 9/11 Attacks Seek to Plead Guilty.”
New York Times. December 9, 2008
Government Accountability Office. 2003. “GAO-03-459: Justice Department’s Project
to Interview Aliens after September 11, 2001.” Washington, D.C.
Government Accountability Office. 2010. “GAO-10-535R: Aviation Security: Efforts
to Validate TSA’ Passenger Screening Behavior Detection Program Underway,
but Opportunities Exist to Strengthen Validation and Address Operational
Challenges.” Washington D.C.
Greenberg, Karen, Jeff Grossman, Francesca Laguardia, Michael Price, and Jason
Porta. 2010. “Terror Trial Report Card 2001-2009.” The NYU School of Law
Center on Law and Security.
http://www.lawandsecurity.org/publications/TTRCFinalJan14.pdf
Gude, Ken. “Criminal Courts Are Tougher on Terrorists than Military Detention.” January
20, 2010. Center for American Progress.
(http://www.americanprogress.org/issues/2010/01/criminal_courts_terrorists.html)
(Accessed January 20, 2011.)
Hewitt, Christopher. 1984. The Effectiveness of Anti-terrorist Policies. Lanham:
University Press of America.
Hobfoll, S. E. 1991. “Traumatic stress: A theory based on rapid loss of resources.”
Anxiety, Stress & Coping 4:187–197.
Jacobs, Andrew. 2010. “China Bans Court Evidence Gained Through Torture.”
The New York Times. May 31, 2010.
Jenkins, Brian Michael. 2010. “Would-Be Warriors: Incidents of Jihadist Terrorist
Radicalization in the United States.” RAND Occassional Paper.
Santa Monica, CA
Jonas, Jeff and Jim Harper. 2006. “Effective Counterterrorism and the Limited Role
of Predictive Data.” December 11, 2006. The Cato Institute. Policy analysis
584:1–11. http://www.cato.org/pub_display.php?pub_id=6784
Isikoff, Michael. 2009. “We Could Have Done This the Right Way.” Newsweek.
April 25, 2009.
Kean, T. H, and H. H Lee. 2004. 9/11 Commission Report: Final Report Of The National
Commission On Terrorist Attacks Upon The United States. 2004. New York:
WW Norton.
Kirk, Michael. 2008. “Bush’s War.” PBS:Frontline. March 25.
Lee, J. K, and H. R Rao. 2007. “Exploring the Causes and Effects of Inter-Agency
Information Sharing Systems Adoption in the Anti/Counter-Terrorism and
Disaster Management Domains.” P. 163 in Proceedings of the 8th annual
international conference on Digital government research: bridging disciplines
& domains: Digital Government Society of North America. Pg. 155-163.
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
WORKS CITED
45
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Leitenberg, Milton. 2005. “Assessing the Biological Weapons and Bioterrorism Threat.”
Center for Security Studies of the Swill Federal Institute of Technology. Zurich.
ISBN 1-58487-221-7
Levitt, Matthew. 2008. “Al-Qa’ida’s Finances: Evidence of Organizational Decline?”
CTC Sentinel. Combatting Terrorism Center: West Point.
http://www.ctc.usma.edu/sentinel/CTCSentinel-Vol1Iss5.pdf
Lum, Cynthia, Leslie Kennedy, and Alison Sherley. 2006. “Are Counter-Terrorism
Strategies Effective? The results of the Campbell Systematic Review of
Counter-Terrorism Evaluation Research.” Journal of Experimental Criminology.
Vol. 2:489-516.
Mayer, Jane. 2010. “Counterfactual: A curious history of the CIA’s secret interrogation
program.” The New Yorker. March 29, 2010
Mason O.J., Brady F. 2009. “The Psychotomimetic Effects of Short-term Sensory
Deprivation’. Journal of Nervous and Mental Disorders. Vol. (10):783-5.
McCoy, Alfred. 2006. A Question of Torture: CIA Interrogation, from the Cold War
to the War on Terror. New York: Henry Holt and Co., Metropolitan Books.
McNicol, D. 2004. A Primer of Signal Detection Theory. L. Erlbaum Associates.
Mahwah, N.J.
Mueller, J., and M. Center. 2008. “The Atomic Terrorist: Assessing the Likelihood.”
Program on International Security, University of Chicago. Chicago, IL 15.
Naftali, Timothy. 2006. Blind Spot : The Secret History of American Counterterrorism.
New York: Basic Books.
National Research Council (U.S.). 2008. Protecting individual privacy in the struggle
against terrorists : a framework for program assessment. Washington D.C.:
National Academies Press.
Pilcher, J. J., and A. I. Huffcutt. 1996. “Effects of sleep deprivation on performance:
a meta-analysis..” Sleep 19:318.
Press, W. H. 2009. “From the Cover: Strong profiling is not mathematically optimal for
discovering rare malfeasors.” Proceedings of the National Academy of Sciences
106:1716-1719.
Priest, Dana and William Arkin. 2010. “Top Secret America.” Washington Post.
July 19-21, 2010. http://projects.washingtonpost.com/top-secret-america/
Rejali, Darius. 2009. Torture and Democracy. Princeton University Press. Princeton, NJ.
Rose, David. 2008 “Tortured Reasoning.” Vanity Fair. December 16th
http://www.vanityfair.com/magazine/2008/12/torture200812?currentPage=4
Rumney, Philip N.S. 2005-2006. “Is Coercive Interrogation of Terrorist Suspects
Effective?: A Response to Bargaric and Clarke.” University of San Francisco Law
Review. Vol. 40.
Ryan, Joe. 2010. “N.J. terror suspects to appear in court for bail hearing.”
The Star-Ledger. June 10, 2010.
Sandomir, David. 2009. “Preventing Terrorism in the Long Term: The Disutility of Racial
Profiling in Preventing Crime and the Counterproductive Nature of Ethnic and
Religious Profiling in Counterterrorism Policing.” Master Thesis. Naval
Postgraduate School. Monterey, CA. http://handle.dtic.mil/100.2/ADA514381
Scheppele, Kim L. 2005. “Hypothetical Torture in the ‘War on Terrorism.’” Journal of
National Security Law and Policy. Vol. 1:285.
Schmid, Alex P. and Ronald Crelinsten, eds. 1993. Western responses to terrorism.
London: Frank Cass Publishers.
Schneier, Bruce. “Profiling.” July 22, 2005. Schneier on Security Blog.
http://www.schneier.com/blog/archives/2005/07/profiling.html
WORKS C I TED
Schneier, Bruce. “Racial Profiling No Better than Random Screening.” February 4,
2009. Schneier on Security Blog.
http://www.schneier.com/blog/archives/2009/02/racial_profilin.html
Seligman, Martin E. P., 1972 “Learned Helplessness.” Annual Review of Medicine.
Vol 23:407-12
Shane, Scott. 2008. “The Unstudied Art of Interrogation.” The New York Times,
March 9. http://www.nytimes.com/2008/03/09/weekinreview/09shane.html
Shane, Scott. 2008. “Inside a 9/11 Mastermind’s Interrogation.” The New York Times,
June 22, 2008. http://www.nytimes.com/2008/06/22/world/americas/22iht-
22ksm.13873332.html
Shane, Scott. 2009. “Waterboarding Used 266 Times on 2 Suspects.” The New York
Times, April 20, 2009. http://www.nytimes.com/2009/04/20/world/20detain.html.
April 19, 2009.
Sheehan, Ivan Sascha. 2007. When Terrorism and Counterterrorism Clash:
The War on Terror and the Transformation of Terrorist Activity. Youngstown,
New York: Cambria.
Sherman, L. W. 1993. “Defiance, deterrence, and irrelevance: A theory of the criminal
sanction.” Journal of Research in Crime and Delinquency 30:445–473.
Solomon, S., J. Greenberg, and T. Pyszczynski. 2004. “The cultural animal: Twenty
years of terror management theory and research.” Handbook of experimental
existential psychology 13–34.
Soufan, Ali. 2009. “My Tortured Decision.” The New York Times. April 23, 2009.
http://www.nytimes.com/2009/04/23/opinion/23soufan.html
Stein, Jeff. 2010. “CIA Man Retracts Claim on Waterboarding.” Foreign Policy.
January 26, 2010.
Tajfel, Henri. “Social Psychology of Intergroup Relations.” Annual Review Psychology.
1982. 33:1-39.
Temple-Raston, Dina. 2010. “Terrorism Case Shows Range of Investigators’ Tools.”
National Public Radio. December 15, 2010.
Transactional Records Access Clearinghouse. “National Profile and Enforcement:
Trends Over Time.” 2006. http://trac.syr.edu/tracfbi/newfindings/current/
U.S. Immigration and Customs Enforcement. “Programs: Special Registration.”
http://www.ice.gov/pi/specialregistration/index.htm
United States Senate Select Committee on Intelligence. 2006. “Report on Postwar
Findings about Iraq’s WMD Programs and Links to Terrorism and How they
Compare with Prewar Assessments.” September 8.
Weiser, Benjamin and Colin Moynihan. 2010. “Guilty Plea in Plot to Bomb Times
Square.” The New York Times. June 21, 2010.
Wilkinson, Paul. 2001. Terrorism Versus Democracy : The Liberal State Response.
New York: Routledge.
Zabel, Richard B. and James J. Benjamin, Jr. 2009. “In Pursuit of Justice: Prosecuting
Terrorism Cases in the Federal Courts.” July 2009. Human Rights First.org.
http://www.humanrightsfirst.org/us_law/prosecute/
Zogby, John. 2005. “Statement before the U.S. House of Representatives Committee
on the Judiciary.” Hearing on “Reauthorization of the PATRIOT Act.”
June 10, 2005.
46
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
ENDNOTES
1 Means employed to block terrorist financing have been applied in overbroad fashion
at times, placing significant burden on Islamic charities. But experts widely support
the goal of denying terrorists money they can use to execute operations.
2 As FBI Special Agent George Venezuelas said in a press conference after Faisal
Shazhad’s failed Times Square bombing attempt: “It’s the tips from the public that
really disrupt these terrorist plots.”
3 There is an ongoing debate about which term is most appropriate for referring to the
loose network of political Islamists employing terrorism against western targets.
Using ‘global jihadists’ offers terrorists their preferred label of ‘holy warriors.’ ‘Al
Qaeda’ is inappropriate in so far as terrorists are not the coherent global organiza-
tion that name implies. Calling disparate terrorists ‘Al Qaeda’ serves to concretize
their narrative power. The term ‘militant Islamists,’ has its own drawbacks. First, lay
audiences often inaccurately link the term directly to Islam as it is peacefully prac-
ticed by hundreds of millions of people around the world, failing to understand that
the term refers to exceedingly rare men and women who violently pursue a funda-
mentalist marriage of Islam and the state called ‘political Islam.’ Second, it is not
clear that every ‘Islamist’ group (violent or not) is really as fundamentalist as they
appear. Many may be using Islamic tropes as a way to voice other (sometimes
democratic or populist) agendas that are formally banned by their relatively authori-
tarian regimes. We choose the term ‘irhabis,’ Arabic for ‘terrorists,’ to refer to
terrorists who kill in the name of (some narrow and distorted interpretation of)
Qu’ran (a text written in Arabic). Researchers might also refer to their struggle not as
‘jihad,’ but as ‘Hirabah,’ Arabic for ‘unholy war.’ For other, appropriate terms, refer to:
http://smallwarsjournal.com/blog/2007/03/words-have-meaning/
4 Brian Michael Jenkins of RAND writes: “The volume of domestic terrorist activity
was much greater in the 1970s than it is today. That decade saw 60 to 70 terrorist
incidents, most of them bombings, on U.S. soil every year—a level of terrorist activ-
ity 15 to 20 times that seen in most of the years since 9/11, even counting foiled
plots as incidents. And in the nine-year period from 1970 to 1978, 72 people died in
terrorist incidents, more than five times the number killed by jihadist terrorists in the
United States in the almost nine years since 9/11” (Jenkins 2010, viii)
5 While at least some of that financial activity has shifted to the traditional, informal,
and difficult-to-trace ‘hawala’ money transfer system, the original crackdown did
result in at least two prosecutions of Al Qaeda financiers, the chilling of support for
Islamic charities that might funnel money to radical Islamists, and later, the prosecu-
tion of scores of many (non-terrorist) hawala bankers in the U.S.
6 The effectiveness of these international efforts is somewhat disputed, but experts on
threat assessment point out that building nuclear, chemical, and biological weapons
is extremely difficult (Mueller and Center 2008; Leitenberg 2005).
7 As part of the USA PATRIOT Act of October, 2001.
8 One of the key problems with information sharing, yet to be fully overcome, stems
from the perverse incentives of the intelligence community, which reward individuals
for marshalling important information at the right time. If the information is broadly
shared before it is clearly valuable, individuals may miss out on opportunities for
praise and promotion. See Lee and Rao (2007) for a thorough discussion of the
causes and effects of inter-agency information sharing.
9 Many have blamed a 'wall' between foreign intelligence investigations and domestic
criminal investigations for the FBI's pre-9/11 failure to attain search and surveillance
warrants for Zacarias Moussaoui. They argue that the Office of Intelligence Policy
Review (OIPR) under Janet Reno's DOJ laid the foundation for that 'wall' in a series
of bureaucratic memos that held little official weight but confused FBI officials seek-
ing to remain on the proper side of FISA's "primary purpose" clause. However,
others have persuasively argued that the "wall" debate was motivated by FBI offi-
cials' desires to excuse what was actually a failure to recognize the threat posed by
Moussaoui. FISA warrants have been famously easy to obtain, even with the over-
sight of OIPR. Thousands have been approved since 1978 while only a handful
have been denied. And the evidence FBI field agents had acquired on Moussaoui at
the time would have been sufficient for a Title III or FISA warrant. It appears,
instead, that FBI headquarters, in rejecting the Minneapolis field office's request to
file a warrant application, simply failed to recognize the threat Moussaoui posed.
10 In “Ordinary Measures Extraordinary Results,” Difo shows that controversial CT
tactics have been used in only a small number of cases. Our closer analysis of
those particular cases shows that the techniques were not in fact decisive for their
outcomes.
11 It is possible that secret FISA or NSA surveillances were used in these or other
investigations that resulted in foiled plots. However, there is little reason to believe
that the post-9/11 changes to FISA would have made a difference in the course or
outcome of these investigations. After 9/11, FISA language was altered to require
that a "significant purpose" of a FISA surveillance was the gathering of foreign intel-
ligence instead of the "primary purpose." Despite the change in language, though,
federal courts have rejected opportunities to distinguish between the two standards
(see U.S.A. v. Stewart, re Sealed Case, and U.S.A. v. Abu Jihaad for examples of
post-FISA-amendment case law). Furthermore, FISA courts (FISCs) have continued
to approve nearly all FISA applications with little or no objection. Thus, for all practi-
cal purposes FISA operates the same now as it did pre-PATRIOT. There is no public
evidence describing the use of warrantless NSA surveillances in any of the investi-
gations that resulted in foiled plots. We address NSA's programs below, but also
note here that many of their surveillances appear to entirely duplicate FISA's func-
tion while avoiding the oversight of any external body (e.g. FISC). There is ample
reason to believe that such low or non-exitstent evidentiary standards for pursuing
such surveillances result in the pursuit of weak leads and the collection of informa-
tional noise that may distract investigators from terrorist signals.
12 Both the 9th and 2nd District Courts ruled in U.S. v. Freitas (1988) and U.S. v. Ville-
gas (1990), respectively, that ‘delayed notification’ searches were permissible in
cases where probable cause was evident and notification of the search would have
disallowed investigators from gathering the evidence they needed to build their
cases. So-called “sneak and peek” privileges were appended to standard probable
cause warrants and constitutionally validated in several subsequent drugs cases.
The PATRIOT ACT merely formalized these rules.
13 The state has long encouraged police to be discerning about who they would inves-
tigate and how aggressively they would pursue evidence. It was common law
practice, in the Anglo-American tradition, that a constable would punish a person for
‘trespass’ if his allegations compelled the constable to enter the home of some inno-
cent third party. This practice prevented the wasting of the constable’s time with
pointless investigations and protected his own reputation as someone who did not
frivolously and unfairly breach the sanctity of the home (Kaplan 1961). As states
bureaucratized and modernized their police forces, they placed similar restrictions
on their own investigators to ensure that they did not waste their time pursuing
unsubstantiated allegations. Thus the professionalizing police forces of the 18th and
19th centuries were usually required to seek permission from a ‘magistrate judge’
before surveilling a person, searching his private belongings, or seizing any of his
property. The U.S. Constitution reflected these emerging norms and citizens’ expec-
tations about their privacy in the Fourth Amendment.
14 NSLs had been used before the PATRIOT Act but only against targets or subjects
of an ‘authorized investigation’ into violent criminality or terrorism. The PATRIOT
Act and a redefinition of the parameters of NSL-usage by then Attorney General,
John Ashcroft, has expanded their use for even ‘preliminary inquiries’ into American
citizens who have not been implicated in criminal or terrorist activity by probable
cause evidence.
15 http://www.ice.gov/pi/specialregistration/index.htm
16 Like any security measure, full-body scanners are imperfect and may not detect
weapons hidden in body cavities. They do, however, increase the burden of opera-
47
tionalizing terrorist weapons while denying terrorists an easy second-tier security
screening.
17 In seeking to offer and present a dispassionate evaluation of security measures’ effi-
cacy, we choose to avoid the use of the term ‘torture,’ which bears more legal and
moral connotation than we wish to consider here.
18 The Department of Defense undertook its own parallel coercive interrogation regime
that resulted in at least a dozen deaths and the infamous abuses of Abu Ghraib
detainees. The DOD regime is widely regarded as a failure. So, for the sake of clar-
ity and charitable inquiry, here we only evaluate the coercive interrogation regime
authorized by the Bush Administration and used by the CIA - an interrogation regime
still advocated by some.
19 These ten are addressed in Bybee’s memos to both the CIA General Counsel and
the White House Counsel. For more details on each method, see pages 2-4 of
either memo (available at http://www.aclu.org/accountability/olc.html).
20 On FOX News broadcast of “The Sean Hannity Show”. April 2009
21 Jose Padilla may have suffered these effects after his extended period of isolation
and sensory disorientation.
22 Muhammad Khatani, under the duress of sleep-deprivation and sensory disorienta-
tion, for instance, reported that thirty of his fellow Guantanamo detainees had been
bodyguards for Osama bin Laden, charges that he later recanted and most experts
agree were false.
23 http://www.politifact.com/truth-o-meter/statements/2010/feb/12/barack-
obama/obama-claims-bush-administration-got-190-terrorism/
24 The sheer quantity of prosecutions and convictions is not a clear indicator of suc-
cess or failure. There was an overuse of “terrorism-related” charges after 9/11 that
may have distracted investigators and prosecutors from the most important cases.
Of the 190 terrorism federal court prosecutions related to irhabi movements, fewer
than a dozen stemmed from serious terrorism incidents. But those who believe that
“experience is the best teacher” might prefer the more experienced Article III courts
for terrorism cases.
25 For instance, while severely sleep deprived and disoriented, Muhammed Khatani
accused thirty separate Guantanamo inmates of being Osama bin Laden’s
bodyguard.
26 Bin Laden’s driver, Salim Hamdan, was sentenced to 5 years and 6 months in mili-
tary commission for offering material support to a terrorist organization, while Ali
Asad Chandia was convicted for the same crime and sentenced to 15 years by a
civilian court. David Hicks, tried by military tribunal for crimes very similar to those of
John Walker Lindh, was sentenced to 7 years in prison. Lindh, prosecuted in a civil-
ian court was sentenced to 20 years. (See Center for American Progress Report:
“Criminal Courts are Tougher on Terrorists than Military Detention”)
27 For more on CIPA, see http://fas.org/sgp/crs/secrecy/89-172.pdf
ENDNOTES
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
¢ CT EVALUATION
Alhomayed, Tariq. 2010. “Combating Al Qaeda Means Protecting Islam.” Asharq
Alawsat Newspaper, January 11 2010.
(http://aawsat.com/english/news.asp?section=2&id=19479)
Art, Robert and Louise Richardson, Eds. 2007. Democracy and Counter-Terrorism:
lessons from the past. Washington D.C.: United States Institute of Peace Press.
Bellingham, Trevor. 2008. New Topics on Terrorism, Counter-Terrorism, and
Preparedness. New York: Nova Science Publishers.
Charters, David. 1994. The Deadly Sin of Terrorism: Its Effect on Democracy and Civil
Liberty in Six Countries. Westport Conn.: Greenwood Press.
Cole, David. 2007 “Government Counter-Terrorism Report Card 2003.” Los Angeles
Times. November 18, 2007. (http://www.stat.cmu.edu/~brian/lost/2007-11-19-la-
times.pdf) (Accessed January 21, 2011.)
Cole, David. 2008. “The Brits Do It Better.” The New York Review of Books 55.
(http://www.nybooks.com/articles/21513)
Crenshaw, Martha. 2009. “Evaluating the Effectiveness of Counter-Terrorism.” Prepared
for the International Studies Association 50th Annual Convention, New York,
New York, February 15-18, 2009.
Cronin, Audrey. 2009. How Terrorism Ends: Understanding the Decline and Demise of
Terrorist Campaigns. Princeton: Princeton University Press.
Donohue, Laura. 2008. The Cost of Counter-Terrorisms Power, Politics, and Liberty.
Cambridge; New York: Cambridge University Press.
Enders, W., T. Sandler, and J. Cauley. 1990. “Assessing the Impact of Terrorist-
Thwarting Policies: An Intervention Time Series Approach.” Defense and Peace
Economics 2:1–18.
Government Accountability Office. 2008. “GAO-08-336. Combating Terrorism: State
Department’s Antiterrorism Program Needs Improved Guidance and More
Systematic Assessments of Outcomes.” Washington, D.C.
Halkides, Mihalis. 1995. “How Not to Study Terrorism.” Peace Review: A Journal of
Social Justice 7:253.
Hewitt, Christopher. 1984. The Effectiveness of Anti-terrorist Policies. Lanham:
University Press of America.
Kennedy, L. W., and C. M. Lum. N.D. “Developing a Foundation for Policy Relevant
Terrorism Research in Criminology. 2003.” Rutgers University: New Brunswick.
Keohane, D. 2005. The EU and Counter-Terrorism. Centre for European Reform.
http://www.cer.org.uk/pdf/wp629_terrorist_counter_keohane.pdf
LaFree, G., and L. Dugan. 2007. “Introducing the Global Terrorism Database.” Terrorism
and Political Violence 19:181–204.
Lum, Cynthia, Leslie Kennedy, and Alison Sherley. 2006. “Are Counter-Terrorism
Strategies Effective? The Results of the Campbell Systematic Review of
Counter-Terrorism Evaluation Research.”
Schmid, Alex P. and Ronald Crelinsten, eds. 1993. Western Responses to Terrorism.
London: Frank Cass Publishers.
Sheehan, Ivan Sascha. 2007. When Terrorism and Counter-Terrorism Clash: The War
on Terror and the Transformation of Terrorist Activity. Youngstown, New York:
Cambria.
Silke, A. 2001. “The Devil You Know: Continuing Problems with Research on Terrorism.”
Terrorism and Political Violence 13:1.
Urquhart, Brian. 2004. “A Matter of Truth.” The New York Review of Books.
(http://www.nybooks.com/articles/17092)
Wilkinson, Paul. 2001. Terrorism Versus Democracy: The Liberal State Response.
New York: Routledge.
48
EXTENDED BIBL IOGRAPHY
¢ CT STRATEGY AND CONTEXT OF CT TACTICS
Abrahms, M. 2008. “What Terrorists Really Want: Terrorist Motives and Counter-
Terrorism Strategy.” International Security 32:78–105.
Arquilla, John, and D. F Ronfeldt. 2001. Networks and Netwars: The Future of Terror,
Crime, and Militancy. RAND Corp.
Arquilla, John. 2008. Worst Enemy: The Reluctant Transformation of the American
Military. Ivan R. Dee. Washington D.C.: United States Institute of Peace Press.
Asharq Alawsat. 2010. “Al-Qaeda Appeals to Sympathizers for Donations.” August 12,
2010. (http://www.asharq-e.com/news.asp?section=1&id=21931)
Aslan, Reza. “The Taliban PR Push.” The Daily Beast, July 30 2009.
(http://www.thedailybeast.com/blogs-and-stories/2009-07-30/the-taliban-pr-push/)
Atran, Scott. 2003. “Genesis of Suicide Terrorism.” Science 299:1534-1539.
Baker, W. E, and R. R Faulkner. 1993. “The Social Organization of Conspiracy: Illegal
Networks in the Heavy Electrical Equipment Industry.” American Sociological
Review 58:837–860.
Benson, Pam. 2010. “Homegrown Terrorist Threat to be Part of National Security
Strategy CNN.com.”
(http://www.cnn.com/2010/POLITICS/05/27/homegrown.terror/index.html)
Bergen, Peter and Paul Cruickshank. 2008. The Unraveling. The New Republic. June
11. (http://www.tnr.com/article/the-unraveling-0) (Accessed January 25, 2011)
Bjelopera, Jerome and Mark Randol. 2010. “American Jihadist Terrorism: Combating
a Complex Threat.” Congressional Research Service. Washington D.C.
December, 7.
Blair, Dennis. 2009. “The National Intelligence Strategy of the United States of
America.” (http://www.dni.gov/reports/2009_NIS.pdf)
Bobbitt, Philip. 2008. Terror and Consent: The Wars for the Twenty-First Century.
1st ed. New York: A.A. Knopf.
Bolz, Frank. 2002. The Counter-Terrorism Handbook: Tactics, Procedures, and
Techniques. 2nd ed. Boca Raton: CRC Press.
Breinholt, J. 2008. “Misperceptions and Misrepresentations about US Counter-Terrorism
Efforts.” Wake Forest Law Review. 43:627.
Brzezinski, Zbigniew. “Terrorized by ‘War on Terror’.” The Washington Post
(http://www.washingtonpost.com/wp-
dyn/content/article/2007/03/23/AR2007032301613.html)
Brzezinski, Zbigniew. 2007. Second Chance: Three Presidents and the Crisis of
American Superpower. New York: Basic Books.
Chivers, Daniel H. and Jonathan S. Snider. “International Nuclear Forensics Regime.”
Security for a New Century, Henry L. Stimson Center
(http://www.armscontrol.org/act/2008_07-08/NuclearForensics)
Clarke, Richard. 2004. Against All Enemies: Inside America’s War on Terror.
Free Press.
Clausewitz, Carl. 1976. On War. Princeton N.J.: Princeton University Press.
Coll, Steve. 2005. Ghost Wars: The Secret History of the CIA, Afghanistan, and
Bin Laden, from the Soviet Invasion to September 10, 2001. New York NY:
Penguin Books.
Congressional Committee Prints. 2008. CMP-2008-DPC-0115. Democrats Have
Consistently Kept Our Focus on Afghanistan and Al Qaeda. July 31. LexisNexis
Congressional Research Digital Collection.
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
49
EXTENDED B IB L I OGRAPHY
Congressional Committee Prints. 2009. CMP-2009-DPC-0130. President Obama
Outlined a Strategy for Afghanistan and Pakistan To Deny Al Qaeda Safe Haven
and Reverse Taliban Momentum. December 7. LexisNexis Congressional
Research Digital Collection.
Congressional Committee Prints. 2009. CMP-2009-GAO-0420. Interagency
Collaboration: Key Issues for Congressional Oversight of National Security
Strategies, Organizations, Workforce, and Information Sharing. September 2009.
LexisNexis Congressional Research Digital Collection.
Congressional Committee Prints. 2010. CMP-2010-DPC-0008. Making Real Progress in
Our Mission To Disrupt, Dismantle and Defeat Al Qaeda. February 11.
LexisNexis Congressional Research Digital Collection.
Congressional Committee Prints. 2010. CMP-2010-DPC-0126. Obama Administration Is
Leading a Tough, Smart Fight To Confront Global Terrorist Threats and Keep
America Safe. October 5. LexisNexisCongressional Research Digital Collection.
Congressional Hearing. 2001. HRG-2001-ASH-0005. U.S. National Security Strategy
and the Quadrennial Defense Review. June 21. LexisNexis Congressional
Hearings Digital Collection.
Congressional Hearing. 2001. HRG-2001-ASH-0015. U.S. National Security Strategy.
March 21. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2002. HRG-2002-ASH-0019. House Intelligence Committee
Report on Counterterrorism Intelligence Capabilities and Performance Prior to
9/11. September 5. LexisNexis
Congressional Hearing. 2002. HRG-2002-BHU-0018. Financial War on Terrorism and
the Administration’s Implementation of Title III of the USA PATRIOT Act.
January 29. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2002. HRG-2002-FOR-0003. New Strategic Framework:
Implications for U.S. Security. February 6. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2003. HRG-2003-HFS-005239. Progress Since 9/11:
The Effectiveness of the U.S. Anti-Terrorist Financing Efforts. March 11.
LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2004. HRG-2004-HGR-0030. Effective Strategies Against
Terrorism. February 3. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2004. HRG-2004-ISS-0007. Intelligence Community Reform.
July 20. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2004. HRG-2004-SGA-0076. Voicing the Need for Reform:
The Families of 9/11. August 17. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2006. HRG-2006-SJS-0019. Examination of the Call To
Censure the President. March 31. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2007. HRG-2005-HIR-0130. U.S. Counterterrorism Strategy
Update. October 27. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2007. HRG-2007-CGR-0084. Six Years Later: Assessing Long-
Term Threats, Risks and the U.S. Strategy for Security in a Post-9/11 World.
October 10. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2007. HRG-2007-CGR-0086. Six Years Later (Part II):
Smart Power and the U.S. Strategy for Security in a Post-9/11 World.
November 6. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2008. HRG-2008-CGR-0082. Six Years Later (Part III):
Innovative Approaches to Combating Terrorists. February 14. LexisNexis
Congressional Hearings Digital Collection.
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Congressional Hearing. 2009. HRG-2009-ASH-0021. Project on National Security
Reform: Commentary and Alternative Views. March 19. LexisNexis
Congressional Hearings Digital Collection.
Congressional Hearings Digital Collection.Committee on Intelligence. 2003. CIS-NO:
2003-S423-3. Joint Inquiry into Intelligence Community Activities Before and
After the Terrorist Attacks of Sept. 11, 2001. CIS-DATE: 2003, SOURCE:
Committee on Intelligence, Select.
Congressional Research Service. 2005. CRS-2005-FDT-0235. Intelligence Community
Reorganization: Potential Effects on DOD Intelligence Agencies. February 11.
LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2008. CRS-2008-FDT-1301. National Security
Strategy: Legislative Mandates, Execution to Date, and Considerations for
Congress. December 15. LexisNexis Congressional Research Digital Collection.
Department of Homeland Security. 2007. Homeland Security Progress on 9/11
Commission Recommendations. September 2007.
(http://www.dhs.gov/xabout/gc_1168618952015.shtm) (Accessed January 25,
2011)
Doherty, Patrick. “Homeland Security, Counter-Terrorism, and Strategic Resilience.”
April 2010. Counter-Terrorism Strategy Initiative, New America Foundation.
Flynn, S. 2004. America the Vulnerable: How Our Government is failing to protect us
from Terrorism. Harper Collins.
Friedman, Benjamin. 2010. Terrorizing Ourselves: Why U.S. Counter-Terrorism Policy is
failing and how to fix it. Washington D.C.: Cato Institute.
Government Accountability Office. 2003. “GAO-04-325T. Homeland Security:
Preliminary Observations on Efforts to Target Security Inspections of Cargo
Containers.” Washington, D.C.
Government Accountability Office. 2004. “GAO-04-408T. Combating Terrorism:
Evaluation of Selected Characteristics in National Strategies Related to
Terrorism.” Washington, D.C.
Government Accountability Office. 2004. “GAO-04-501T. Combating Terrorism: Federal
Agencies Face Continuing Challenges in Addressing Terrorist Financing and
Money Laundering”. Washington, D.C.
Government Accountability Office. 2004. “GAO-04-591. Homeland Security: Selected
Recommendations from Congressionally Chartered Commissions and GAO.”
Washington, D.C.
Government Accountability Office. 2007. “GAO-07-398T. Homeland Security:
Management and Programmatic Challenges Facing the Department of
Homeland Security.” Washington, D.C.
Government Accountability Office. 2007. “GAO-08-126T. Maritime Security: The SAFE
Port Act: Status and Implementation One Year Later.” Washington, D.C.
Government Accountability Office. 2008. “GAO-08-329T. Border Security: Despite
Progress Weaknesses in Traveler Inspections Exist at Our Nation’s Ports of
Entry.” Washington, D.C.
Government Accountability Office. 2008. “GAO-08-508T. Secure Border Initiative:
Observations on the Importance of Applying Lessons Learned to Future
Projects.” Washington, D.C.
Grewe, Barbara. “Legal Barriers to Information Sharing: The Erection of a Wall Between
Intelligence and Law Enforcement Investigations.” 9/11 Commission Staff
Monograph. 2004.
Hanzhang, General Tao, and Tao Hanzhang. 2007. Sun Tzu’s Art of War: The Modern
Chinese Interpretation. Sterling Innovation.
Hayden, General Michael V. 2010. Protecting America and Winning the Intelligence
War. Heritage Lectures. May 26. (http://report.heritage.org/hl1167) (Accessed
January 25, 2011)
Hoffman, B. 2005. Does Our Counter-Terrorism Strategy Match the Threat? RAND
Corp. Santa Monica, CA.
Hoffman, Bruce. 2009. “A Counter-Terrorism Strategy for the Obama Administration.”
Terrorism and Political Violence 21:359.
Jenkins, Brian Michael. 2010. Would-be Warriors: Incidents of Jihadist Terrorist
Radicalization in The United States Since September 11, 2001. The Rand
Corporation.
Kean, T. H, and H. H Lee. 2004. 9/11 Commission Report: Final Report Of The National
Commission On Terrorist Attacks Upon The United States. 2004. New York:
WW Norton.
Kirk, Michael. 2008. “Bush’s War.” PBS: Frontline. March 25.
Larsen, Randall. 2007. Our Own Worst Enemy: Asking The Right Questions About
Security to protect you, your family and America. 1st ed. New York N.Y.:
Warner Books.
Lee, J. K, and H. R Rao. 2007. “Exploring the Causes and Effects of Inter-Agency
Information Sharing Systems Adoption in the Anti/Counter-Terrorism and
Disaster Management Domains.” P. 163 in Proceedings of the 8th Annual
International Conference on Digital Government Research: Bridging Disciplines
& Domains: Digital Government Society of North America. Pg. 155-163.
Leitenberg, Milton. 2005. “Assessing the Biological Weapons and Bioterrorism Threat.”
Center for Security Studies of the Swill Federal Institute of Technology. Zurich.
ISBN 1-58487-221-7
Levitt, Matthew. 2008. “Al-Qa’ida’s Finances: Evidence of Organizational Decline?”
CTC Sentinel. Combating Terrorism Center: West Point.
(http://www.meforum.org/2579/syria-financial-support-jihad)
“McChrystal: We’ve Shot ‘An Amazing Number’ Of Innocent Afghans.” April 2, 2010.
The Huffington Post. April 2 2010.
(http://www.huffingtonpost.com/2010/04/02/mcchrystal-weve-shot-an-
a_n_523749.html)
McConnel, J.M. 2007. “The National Counter-Intelligence Strategy of the United
States.” (http://www.dni.gov/reports/NCIX_Strategy_2007.pdf)
McConnel, J.M. 2007. “An Overview of the National Intelligence Community.”
(http://www.dni.gov/who_what/061222_DNIHandbook_Final.pdf)
McConnel, J.M. 2008. “Vision 2015: A Globally Networked and Integrated Intelligence
Enterprise.” (http://www.dni.gov/reports/Vision_2015.pdf)
McCulloch, J., and B. Carlton. 2005. “Preempting Justice: Suppression of Financing
of Terrorism and the War on Terror.” Current Issues Crim. Just. 17:397.
“Media Round-Up: Executive Orders and Retired Military Leaders.” January 23, 2009.
HumanRightsFirst.org. (http://www.humanrightsfirst.org/2009/01/23/media-round-
up-executive-orders-and-retired-military-leaders/)
Mueller, J., and M. Center. 2008. “The Atomic Terrorist: Assessing the Likelihood.”
Program on International Security, University of Chicago. Chicago, IL 15.
Naftali, Timothy. 2006. Blind Spot: The Secret History of American Counter-Terrorism.
New York: Basic Books.
Office of the Director of National Intelligence. 2005. “The National Intelligence Strategy
of the United States of America.”
(http://www.dni.gov/publications/NISOctober2005.pdf)
50
Office of the Director of National Intelligence. 2006. “Report on the Progress of the
Director of National Intelligence in Implementing the “Intelligence Reform and
Terrorism Prevention Act of 2004”.” (http://www.dni.gov/reports/CDA_14-25-
2004_report.pdf)
Office of the Director of National Intelligence. 2009a. “An Overview of the U.S.
Intelligence Community for the 111th Congress.”
(http://www.dni.gov/overview.pdf)
Office of the President. 2006. The National Security Strategy of the United States of
America.
Office of the President. 2006. The National Strategy for Combating Terrorism.
(http://hosted.ap.org/specials/interactives/wdc/documents/wh_terror060905.pdf)
Office of the President. 2010. The National Security Strategy of the United States
of America.
(www.whitehouse.gov./sites/default/files/rss_viewer/national_strategy.pdf)
Accessed January 2011.
Posen, B. R. 2002. “The Struggle against Terrorism: Grand Strategy, Strategy,
and Tactics.” International Security 26:39–55.
Priest, Dana and William Arkin. 2010. “Top Secret America.” Washington Post.
July 19-21, 2010. (http://projects.washingtonpost.com/top-secret-america/)
Rowley, Coleen and members of the Veteran Intelligence Professionals for Sanity.
“How Not to Counter Terrorism.” June 18, 2007. WarIsACrime.org.
(http://www.afterdowningstreet.org/?q=node/23755)
Scahill, Jeremy. 2010. Killing Reconciliation. The Nation. October 27.
(http://www.thenation.com/article/155622/killing-reconciliation) (Accessed
January 25, 2011)
Sheehan, Michael. 2008. Crush the Cell: How to Defeat Terrorism Without Terrorizing
Ourselves. 1st ed. New York: Crown Publishers.
Smith, R. 2008. The Utility of Force: The Art of War in the Modern World.
Vintage Books USA.
¢ FOILED TERROR PLOTS AND‘RADICALIZATION’
ABC News. 2009. “Alleged Dallas Bomb Plot Trial Set for June.” November 25.
(http://abclocal.go.com/ktrk/story?section=news/state&id=7138727)
Abramson, Larry, Maria Godoy, and Katie Gradowski. 2005. The Patriot Act: Justice
Department Claims Success.” NPR. March, 4.
http://www.npr.org/templates/story/story.php?storyId=4756706
Bailey, Eric. 2007. “Lodi Man Gets 24 Years in Terrorism Case.” Los Angeles Times.
September, 11. http://articles.latimes.com/2007/sep/11/local/me-lodi11
BBC. 2009. “Sears Tower Bomb Plot Leader Narseal Batiste Jailed.” November 20.
(http://news.bbc.co.uk/2/hi/8371671)
Belluck, Pam. 2003. “Threats and Responses: The Bomb Plot; Unrepetant Shoe
Bomber is Given a Life Sentence for Trying to Blow up Jet.” The New York
Times. January, 31. http://www.nytimes.com/2003/01/31/us/threats-responses-
bomb-plot-unrepentant-shoe-bomber-given-life-sentence-for.html
Bjelopera, Jerome and Mark Randol. 2010. “American Jihadist Terrorism:
Combating a Complex Threat.” Congressional Research Service. Washington
D.C. December, 7.
Bloomberg. 2003. “U.S. Officials Arrest 8 in ‘Virginia Jihad Network.’” Bloomberg.
June, 27.
http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aff9sXPzxHyk
&refer=us
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
EXTENDED B IB L I OGRAPHY
51
CBS News. 2009. “Jordanian Indicted in Dallas Bomb Plot.” October 8.
(http://www.cbsnews.com/stories/2009/10/08/national/main5371726.shtml)
CBS News. 2006. “Penn. Man Named in Alleged Terror Plot.” February 11.
CBS News. 2007. “Terror Suspect Pleads Guilty to Mall Attack Plot.” November 28.
(http://cbs2chicago.com/local/derrick.shareef.cherryvalle.2.597906.html)
CNN. 2006. “FBI: Three Held in New York Tunnel Plot.” July 7.
(http://www.cnn.com/2006/U.S./07/07/tunnel.plot/index.html)
CNN. 2010. “Airplane Bomb Suspect Pleads Not Guilty.” January 8.
(http://www.cnn.com/2010/CRIME/01/08/terror.hearing/index.html)
Cristina Corbin. 2009. “Patriot Act Likely Helped Thwart NYC Terror Plot, Security
Experts Say.” http://www.foxnews.com/politics/2009/05/21/patriot-act-likely-
helped-thwart-nyc-terror-plot-security-experts-say/ (Accessed January 20, 2011).
Department of Homeland Security, Press Release. 2009. “Liberty City Defendants
Sentenced to Federal Prison on Terror-Related Charges.” November 20.
(http://www.ice.gov/pi/nr/0911/091120miami.htm)
Department of Justice Press Release. 2010. “Man who Formed Terrorist Group that
Plotted Attacks on Military and Jewish Facilites Sentenced to 16 Years in
Federal Prison.” March 6.
(http://losangeles.fbi.gov/dojpressrel/pressrel09/la030609ausa.htm)
Department Of Justice, Press Release. 2009. “Ohio Man Sentenced to 20 years for
Terrorism Conspiracy to Bomb Targets in Europe and the United States.”
February 26. (http://www.justice.gov/usao/ohs/Press/02-26-09-DOJ.pdf)
Department of Justice, Press Release. 2010. “Najibullah Zazi Pleads guilty to
Conspiracy to Use Explosives Against Persons or Property in U.S., Conspiracy
to Murder Abroad, and Providing Material Support to Al-Qaeda.” February 22.
(http://www.justice.gov/opa/pr/2010/February/10-ag-174.html)
Department of Justice, Press Release. 2010. “Zarein Ahmedzay Pleads Guilty to Terror
Violations in Connection with Al-Qaeda New York Subway Plot.” April 23.
(http://www.justice.gov/opa/pr/2010/April/10-ag-473.html)
Department of Justice. 2007. “Hamid Hayat Sentenced to 24 Years in Connection with
Terrorism Charges.” Washington, D.C. September, 10.
http://www.justice.gov/opa/pr/2007/September/07_nsd_700.html
Dienst, Jonathan. 2009. “FBI, NYPD Arrest 4 in Alleged Plot to Bomb NY Synagogues.”
NBC New York. May 2009. (http://www.nbcnewyork.com/news/local-beat/FBI-
Bust-Plot-Foiled.html)
Difo, Germain. “Ordinary Measures, Extraordinary Results: As Assessment of Foiled
Plots Since 9/11.” May 2010. American Security Project.
Dreihaus, Bob. 2007. “U.S. Indicts an Ohio Man in Terror Conspiracy Case.”
New York Times. April 13, 2007.
Erickson, Kurt. 2009. “Trial Delayed to Determine Alleged Bomber’s Fitness.”
Herald-Review.com. December 22.
Federal Bureau of Investigation. 2003. “Two Defendants in ‘Portland Cell’ Plead Guilty
to Conspiracy to Contribute Services to the Taliban, Federal Weapons Charges.”
Washington, D.C. September, 18. http://www.fbi.gov/news/pressrel/press-
releases/two-defendants-in-portland-cell-case-plead-guilty-to-conspiracy-to-
contribute-services-to-the-taliban-federal-weapons-charges
Fiaola, Anthony and Steven Mufson. 2007. “N.Y. Airport Target of Plot, Officials Say.”
Washington Post. June 3, 2007. (http://www.washingtonpost.com/wp-
dyn/content/article/2007/0602/AR2007060200606.html)
File, Thom and Sarah Crissey. 2010. Voting and Registration in the Election of
November 2008: Population Characteristics. U.S. Census Bureau. May 2010.
(http://www.census.gov/hhes/www/socdemo/voting/index.html) (Accessed
January 25, 2011)
Fox News. 2009. “Four Suspects in New York Terror Plot Plead Not Guilty.” June 3.
(http://www.foxnews.com/story/0,2933,525009,00.html)
Fox Toledo News. 2008. “Informant: Terror Suspects Sought Him.” May 10.
(http://www.foxtoledo.com/dpp/news/Informant_Terror_Suspects_Sought_Him)
Gendar, Alison and Bill Hutchinson. 2009. “Assem Hammoud, Suspect in Alleged
New York Tunnels Plot, Released on Bail in Lebanon.” New York Daily News,
March 18. (http://www.nydailynews.com/news/national/2009/03/17/2009-03-
17_assem_hammoud_suspect_in_alleged_new_yor.html)
Goodnough, Abby and Liz Robbins. 2009. “Mass. Man Arrested in Terrorism Case.”
October 21. (http://www.nytimes.com/2009/10/22/us/22terror.html)
Goodnough, Abby, and Scott Shane. 2007. “Padilla Is Guilty on All Charges in Terror
Trial.” The New York Times, August 17
http://www.nytimes.com/2007/08/17/us/17padilla.html (Accessed January 20,
2011).
Horowitz, Craig. “Anatomy of a Foiled Terrorist Plot.” New York Magazine. May, 21.
http://nymag.com/nymetro/news/features/10559/
Hosenball, Mark, Michael Isikoff, and Evan Thomas. 2010. “The Radicalization of
Umar Farouk Abdulmutallab.” Newsweek. January 2.
(http://www.newsweek.com/id/229047/page/1)
Jeffrey, Terrence. 2006. “Terrorist Blamed his Failure on Bush.” Human Events.
February 10. http://www.humanevents.com/article.php?id=12329
Jenkins, Brian Michael. 2010. Would-be Warriors: Incidents of Jihadist Terrorist
Radicalization in The United States Since September 11, 2001. The Rand
Corporation.
Johnson, Dirk. 2009. “Suspect in Illinois Bomb Plot ‘Didn’t Like America Very Much’.”
New York Times. March 27.
(http://www.nytimes.com/2009/09/28/us/28springfield.html?_r=1)
Johnson, Dirk. 2009. “Two Men Accused in Alleged Bomb Plots in Illinois, Texas.”
September 25. (http://www.chicagotribune.com/news/nationworld/la-na-terror-
illinois25-2009sep25,0,1761634.story)
Johnson, Kevin. 2009. “Alleged Terror Threat Seem as ‘Most Serious’
Since 9/11 Attacks.” USA Today. September 25.
(http://www.usatoday.com/news/nation/2009-09-24-terror-probe_N.htm)
Knickerbocker, Brad. “‘Jihad Jane’ joins growing list of American terror suspects.”
Christian Science Monitor, March 12, 2010.
(http://www.csmonitor.com/USA/2010/0312/Jihad-Jane-joins-growing-list-of-
American-terror-suspects)
Leinwand, Donna and Jack Kelley. 2002. “U.S. Citizen Arrested in ‘Dirty Bomb’ Plot.”
USA Today. June, 11.
Lichtblau, Eric and Monica Davey. 2003. “Threats and Responses: Terror; Suspect
in Plot on Bridge Drew Interest Earlier.” The New York Times. June, 21.
http://www.nytimes.com/2003/06/21/us/threats-and-responses-terror-suspect-in-
plot-on-bridge-drew-interest-earlier.html
Liptak, Adam. 2007. “Spying Program May be Tested by Terror Case.” The New York
Times. August, 26. http://www.nytimes.com/2007/08/26/us/26wiretap.html
McCauley, Clark, and Sophia Moskalenko. 2008. “Mechanisms of Political
Radicalization: Pathways Toward Terrorism.” Terrorism and Political Violence
20:415.
EXTENDED B IB L I OGRAPHY
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
McCormack, William. 2009 “State and Local Law Enforcement: Contributions to
Terrorism Prevention.” FBI Law Enforcement Bulletin. March.
http://www2.fbi.gov/publications/leb/2009/march2009/terrorism.htm
McNeill, Jena B. and James Carafano. 2009. “Terrorist Watch: 23 Plots Foiled Since
9/11. Heritage Foudnation. July 2.
http://www.heritage.org/research/reports/2009/07/terrorist-watch-23-plots-foiled-
since-9-11
Merley, Steven. 2009. “The Muslim Brotherhood in the United States.” Hudson Institute
http://www.currenttrends.org/docLib/20090411_Merley.USBROTHERHOOD.pdf
Montgomery, Leigh and Elizabeth Ryan. 2009. “Terrorist Plots Uncovered in the U.S.
Since 9/11.” Christian Science Monitor. September 26.
http://www.csmonitor.com/USA/2009/0926/p02s08-usgn.html
MSNBC. 2009. “U.K. Airline Bomb Plot Ringleader Gets 40 Years.” April 26.
(http://www.msnbc.msn.com/id/32838860)
“NEFA - The Philly Meeting of the Muslim Brotherhood.”
(http://www1.nefafoundation.org/miscellaneous/93Phillyfinal.pdf)
New York Times. 2009. “Trans-Atlantic-Aircraft Plot.” September 14.
(http://topics.nytimes.com/top/reference/timestopics/subjects/t/terrorism/200
6_transatlantic_aircract_plot/index.html?scp=1&sq=liquid%20explosives%20
plot&st=cse)
Peck, Christian W. 2004. Muslims in the American Public Square: Shifting Political
Winds & Fallout from 9/11, Afghanistan, and Iraq. Zogby International.
October 2004.
Raddatz, Martha and Nick Schifrin. “Pakistan Arrests American Al Qaeda Member, But
Identity Not Confirmed.” March 7, 2010. American Broadcasting Company News.
(http://abcnews.go.com/Politics/american-al-qaeda-arested-gadahn-pakistan-
official/story?id=10035076)
Rashbaum, William K. 2010. “After Months of Scrutiny in Zazi Terrorism Case, Two
Arrest Came As A Surprise.” New York Times. January 8.
(http://www.nytimes.com/2010/01/09/nyregion/09zazi.html?pagewanted=1)
Rotella, Sebastian. “U.S. Sees Homegrown Muslim Extremism as Rising Threat.”
December 7, 2009. Los Angeles Times. (http://www.latimes.com/news/nation-
and-world/la-na-us-radicalization7-2009dec07,0,2042129,print.story)
Roy, O. 2008. Al Qaeda in the West as a Youth Movement: The Power of Narrative.
MICROCON Policy Working Paper 2, Brighton: MICROCON.
(http://www.esocialsciences.com/data/articles/Document12212009340.5353662.p
df) (Accessed January 25, 2011.)
Rummel, David, Lowell Bergman, and Matthew Purdy. 2003. “Chasing the Sleeper
Cell.” Frontline. PBS. October, 16.
http://www.pbs.org/wgbh/pages/frontline/shows/sleeper/etc/script.html
Russakoff, Dale and Dan Eggen. 2007. “Six Charged in Plot to Attack Fort Dix.”
Washington Post, May 9, 2007.
Ryan, Joe. “N.J. terror suspects to appear in court for bail hearing.” Hiiraan Online,
June 10, 2010. (http://www.hiiraan.com/comments2-news-2010-Jun-
n_j_terror_suspects_to_appear_in_court_for_bail_hearing.aspx)
Schmitt, Eric, and Charlie Savage. 2010. “In Terrorism Stings, Questions of
Entrapment.” The New York Times, November 29
http://www.nytimes.com/2010/11/30/us/politics/30fbi.html
(Accessed January 20, 2011).
St. Petersburg Times. 2010. “Q&A: The Plot.” March 10.
(http://www.sptimes.com/2006/08/10/Worldandnation/QA_The_plot.shtml)
52
Stern, Jessica. 2010. “Mind Over Martyr: How to De-Radicalize Islamist Extremists.”
Foreign Affairs. Council on Foreign Relations. January/February 2010.
Sulzberger, A.G. 2010. “Two More Men Charged in Plot to Bomb Subways.” New York
Times. February 25. (http://www.nytimes.com/2010/02/26/nyregion/26terror.html)
Temple-Raston, Dina. Terrorism Case Shows Range of Investigators’ Tools. National
Public Radio. October 3.
(http://www.npr.org/templates/story/story.php?storyId=113453193) (Accessed
January 25, 2011)
The Guardian. 2009. “Former U.S. University Student Convicted of Terror Charge.”
June 10. (http://www.guardian.co.uk/world/2009/jun/10/georgia-tech-student-
videotape-terrorism)
Thomas, Pierre and Jason Ryan. 2009. “FBI Stings are Chilling Evidence of
Homegrown Terror.” ABC News. September 25.
(http://abcnews.go.com/Politics/fbi-terror-stings-smadi-finton-allegedly-ties-
osama/story?id=8670328)
Thomas, Pierre and Jason Ryan. 2010. “’Lone Wolf’ Charged with Plotting Attack
During Christmas Rush.” ABC News. March 4.
(http://abcnews.go.com/TheLaw/story?id=2710776&page=1)
Times. 2007. “Profile: Khalid Sheikh Mohammed.” The Times (UK), March 15
http://www.timesonline.co.uk/tol/news/world/us_and_americas/article1517893.ec
e (Accessed January 20, 2011).
Trahan, Jason, Todd J. Gillman, and Scott Goldstein. “Dallas Bomb Plot Suspect Told
Landlord He was Moving Out.” Dallas Morning News. September 26.
(http://www.dallasnews.com/sharedcontent/dws/dn/latestnews/stories/092409dn
metbombarrest.1b177db8b.html)
United States Department of Justice. 2008. “Passing Secrets at Sea.” March 10.
(http://www.fbi.gov/page2/march08/secrets_031008.html)
White, Josh, and Keith B. Richburg. n.d. “Terror Informant for FBI Allegedly Targeted
Agents.” The Washington Post http://www.washingtonpost.com/wp-
dyn/content/article/2008/01/18/AR2008011803766.html (Accessed January 20,
2011).
¢ EXPANDED SEARCH AND SURVEILLANCE TOOLS
American Civil Liberties Union. “ACLU Releases Comprehensive Report On Patriot Act
Abuses.” March 11, 2009. (http://www.aclu.org/national-security/aclu-releases-
comprehensive-report-patriot-act-abuses)
Bell, Colleen. 2006. “Surveillance Strategies and Populations at Risk: Biopolitical
Governance in Canada’s National Security Policy.” Security Dialogue 37:
147-165.
Center for National Security Studies. 2007. “The Foreign Intelligence Surveillance Act
and Effectively Protecting the Liberty and Security of Americans.”
Committee Print. 2003. CMP-2003-ISH-0002. Compilation of Intelligence Laws and
Related Laws and Executive Orders of Interest to the National Intelligence
Community, As Amended Through Mar. 25,2003. June 2003. LexisNexis
Congressional Research Digital Collection.
Congressional Committee Print. 2005. CMP-2005-GAO-0019. USA PATRIOT Act:
Additional Guidance Could Improve Implementation of Regulations Related to
Customer Identification and Information Sharing Procedures. May 2005.
LexisNexis Congressional Research Digital Collection.
Congressional Hearing. 2001. HRG-2001-SJS-0037. Protecting Constitutional
Freedoms in the Face of Terrorism. October 3. LexisNexis Congressional
Hearings Digital Collection.
EXTENDED B IB L I OGRAPHY
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
53
Congressional Hearing. 2001. HRG-2001-SJS-0052. Department of Justice Oversight:
Preserving Our Freedoms While Defending Against Terrorism. December 28.
LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2002. HRG-2002-SJS-0001. Tools Against Terror: How the
Administration Is Implementing New Laws in the Fight To Protect Our Homeland.
October 9. LexisNexis Congressional
Congressional Hearing. 2003. HRG-2003-HJH-0048. Anti-Terrorism Investigations and
the Fourth Amendment After Sept. 11, 2001. May 20. LexisNexis Congressional
Hearings Digital Collection.
Congressional Hearing. 2003. HRG-2003-SJS-0034. America After 9/11: Freedom
Preserved or Freedom Lost. November 18. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2003. HRG-2003-SJS-0058. Oversight Hearing: Law
Enforcement and Terrorism. July 23. LexisNexis Congressional Hearings Digital
Collection.
Congressional Hearing. 2004. HRG-2004-HFS-0085. Legislative Proposals To
Implement the Recommendations of the 9/11 Commission. September 22.
LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2004. HRG-2004-SJS-0046. Review of Counter-Terrorism
Legislation and Proposals, Including the USA PATRIOT Act and the SAFE Act.
September 22. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2004. HRG-2004-SJS-0050. FBI Oversight: Terrorism and
Other Topics. May 20. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2004. HRG-2004-SJS-0052. DOJ Oversight: Terrorism and
Other Topics. June 8. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0158. Implementation of the USA
PATRIOT Act: Section 201, 202, 223 of the Act That Address Criminal Wiretaps,
and Section 213 of the Act That Addresses Delayed Notice. May 3. LexisNexis
Congressional Hearings Digital Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0161. USA PATRIOT Act: A Review for
the Purpose of Reauthorization. April 6. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0164. Reauthorization of the USA
PATRIOT Act. June 8. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0166. Implementation of the USA
PATRIOT Act: Prohibition of Material Support Under Sections 805 of the USA
PATRIOT Act and 6603 of the Intelligence Reform and Terrorism Prevention Act
of 2004. May 10. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0167. Implementation of the USA
PATRIOT Act: Effect of Sections 203(B) and (D) on Information Sharing. April 19.
LexisNexis Congressional Hearings.
Congressional Hearing. 2005. HRG-2005-HJH-0168. Implementation of the USA
PATRIOT Act: Section 212—Emergency Disclosure of Electronic
Communications To Protect Life and Limb. May 5. LexisNexis Congressional
Hearings Digital Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0169. Implementation of the USA
PATRIOT Act: Section 218—Foreign Intelligence Information (“The Wall”). April
28. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0170. Implementation of the USA
PATRIOT Act: Sections of the Act That Address the Foreign Intelligence
Surveillance Act (FISA). April 26, 28. LexisNexis Congressional Hearings Digital
Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0171. Implementation of the USA
PATRIOT Act: Crime, Terrorism and the Age of Technology. April 21. LexisNexis
Congressional Hearings Digital Collection.
Congressional Hearing. 2005. HRG-2005-HJH-0174. Reauthorization of the USA
PATRIOT Act (Continued). June 10. LexisNexis Congressional Hearings Digital
Collection.
Congressional Hearing. 2005. HRG-2005-ISS-0008. USA PATRIOT Act. May 24.
LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2005. HRG-2005-SJS-0023. Oversight of the USA PATRIOT
Act. May 10. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2006. HRG-2006-HSC-0022. Protection of Privacy in the DHS
Intelligence Enterprise, Part II and I. April 6. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2007. HRG-2007-HFS-0038. Suspicious Activity and Currency
Transaction Reports: Balancing Law Enforcement Utility and Regulatory
Requirements. May 10. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2007. HRG-2007-HJH-0019. Inspector General’s Independent
Report on the FBI’s Use of National Security Letters. March 20. LexisNexis
Congressional Hearings Digital Collection.
Congressional Hearing. 2007. HRG-2007-SJS-0009. Misuse of Patriot Act Powers: The
Inspector General’s Findings of Improper Use of the National Security Letters by
the FBI. March 21. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2007. HRG-2007-SJS-0034. Responding to the Inspector
General’s Findings of Improper Use of National Security Letters by the FBI. April
2007. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2007. HRG-2007-SJS-0067. Oversight of the Federal Bureau of
Investigation. March 27. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2008. HRG-2008-HJH-0009. National Security Letters Reform
Act of 2007. April 15. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2009. HRG-2009-HJH-0047. USA PATRIOT Act. September 22.
LexisNexis Congressional Hearings.
Congressional Hearing. 2009. HRG-2009-SJS-0025. Reauthorizing the USA PATRIOT
Act: Ensuring Liberty. September 23. LexisNexis Congressional Hearings Digital
Collection.
Congressional Research Service. 2001. CRS-2001-AML-0052. Terrorism: Section-by-
Section Analysis of the USA PATRIOT Act. December 10. LexisNexis
Congressional Research Digital Collection.
Congressional Research Service. 2002. CRS-2002-AML-0032. USA PATRIOT Act: A
Legal Analysis. April 15. LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2002. CRS-2002-AML-0037. USA PATRIOT Act: A
Sketch. April 18. LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2002. CRS-2002-AML-0089. Terrorism and
Extraterritorial Jurisdiction in Criminal Cases: Recent Developments in Brief.
September 6. LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2004. CRS-2004-AML-0195. Financial Institution
Customer Identification Programs Mandated by the USA. Aug 5. LexisNexis
Congressional Research Digital Collection.
Congressional Research Service. 2004. CRS-2004-RSI-0073. “Sensitive But
Unclassified” and Other Federal Security Controls on Scientific and Technical
Information: History and Current Controversy. Feb 20. LexisNexis Congressional
Research Digital Collection.
EXTENDED B IB L I OGRAPHY
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Congressional Research Service. 2004. CRS-2004-RSI-1110. Internet Privacy: Law
Enforcement Monitoring of E-Mail and Web Usage. August 17. LexisNexis
Congressional Research Digital Collection.
Congressional Research Service. 2005. CRS-2005-AML-0056. Security and Freedom
Ensured Act (SAFE Act) (H.R. 1526) and Security and Freedom Enhancement
Act (SAFE Act) (S. 737): Section-By-Section Analysis. May 9. LexisNexis
Congressional Research Digital Collection.
Congressional Research Service. 2005. CRS-2005-AML-0057. SAFE Acts of 2005:
H.R. 1526 and S. 737 — A Sketch. May 9. Congressional Research Digital
Collection.
Congressional Research Service. 2006. CMP-2006-HJH-0006. Constitution in Crisis:
With 26 Laws Implicated by Administration Misconduct. June 2006. LexisNexis
Congressional Research Digital Collection.
Congressional Research Service. 2006. CRS-2006-AML-0019. USA PATRIOT
Improvement and Reauthorization Act of 2005. February 17. LexisNexis
Congressional Research Digital Collection.
Congressional Research Service. 2006. CRS-2006-AML-0035. Libraries and the USA
PATRIOT Act. Feb. 3. LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2006. CRS-2006-AML-0071. USA Patriot Act Sunset:
A Sketch. Feb 6. LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2006. CRS-2006-AML-0192. USA PATRIOT
Improvement and Reauthorization Act of 2005: A Sketch. March 28. LexisNexis
Congressional Research Digital Collection.
Congressional Research Service. 2006. CRS-2006-AML-0477. USA PATRIOT
Improvement and Reauthorization Act of 2005: A Legal Analysis. December 21.
LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2006. CRS-2006-FDT-0169. Statutory Procedures
Under Which Congress Is to Be Informed of U.S. Intelligence Activities,
Including Covert Operations. January 18. LexisNexis Congressional Research
Digital Collection.
Congressional Research Service. 2007. CRS-2007-FDT-0229. Sharing Law
Enforcement and Intelligence Information: The Congressional Role. February 13.
LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2010. CRS-2010-AML-0134. Government Collection
of Private Information: Background and Issues Related to the USA PATRIOT Act
Reauthorization. March 2. LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2010. CRS-2010-AML-0140. Amendments to the
Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2011.
March 2. LexisNexis Congressional Research Digital Collection.
Congressional Research Service. 2010. CRS-2010-AML-0484. National Security
Letters: Proposed Amendments in the 111th Congress. Dec 27. LexisNexis
Congressional Research Digital Collection.
Congressional Research Service. 2010. CRS-2010-FDT-0861. Intelligence Issues for
Congress. Oct. 14. LexisNexis Congressional Research Digital Collection.
Cristina Corbin. 2009. “Patriot Act Likely Helped Thwart NYC Terror Plot, Security
Experts Say.” http://www.foxnews.com/politics/2009/05/21/patriot-act-likely-
helped-thwart-nyc-terror-plot-security-experts-say/ (Accessed January 20, 2011).
Department of Justice. Office of Inspector General. “A Review of the Federal Bureau of
Investigation’s Use of National Security Letters.” March 2007.
(Http://www.usdoj.gov/oig/special/s0703a/final.pdf)
Department of the Treasure, Financial Crimes Enforcement Network, the SAR Activity
Review – By The Numbers, Issue 10. Retrieved May 2008.
(http://www.fincen.gov/news room/rp/files/sar by num 10.pdf)
54
Electronic Privacy Information Center. “Foreign Intelligence Surveillance Act Orders,
1979-2007.” Retrieved December 1, 2008.
(http://epic.org/privacy/wiretap/stats/fisa_stats.html#footnote12)
Fine, Glenn. 2007-A. “A Review of the Federal Bureau of Investigation’s Use of National
Security Letters.” Office of the Inspector General. Department of Justice. March
2007. Washington, D.C.
Fine, Glenn. 2007-B. “A Review of the Federal Bureau of Investigation’s Use of Section
215 Orders for Business Records.” Office of the Inspector General. Department
of Justice. March 2007. Washington, D.C.
Gellman, Barton. 2005. “The FBI’s Secret Scrutiny.” The Washington Post.
November 6, 2005.
Hearings Digital Collection. Congressional Hearing. 2002. HRG-2002-SJS-0003.
Oversight of the Department of Justice. July 25. LexisNexis Congressional
Hearings Digital Collection.
Howell, Beryl A. 2003. “Seven Weeks: The Making of the USA Patriot Act.” George
Washington Law Review 72:1145.
“IG’s report on misuse of PATRIOT ACT.” (http://web.lexis-
nexis.com/congcomp/attachment/a.pdf?_m=4ef075b3a87081fb3c4e5c8780aae7
3a&wchp=dGLbVtb-
zSkSA&_md5=99546f04aafd3478e102e00e88e50942&ie=a.pdf)
Jackson, Brian. 2009. The Challenge of Domestic Intelligence in a Free Society: a
Multidisciplinary look at the Creation of a U.S. Domestic Counter-Terrorism
intelligence agency. Santa Monica CA: Rand Corp.
Johnson, Carrie. 2009. “Director of FBI Urges Renewal of Patriot Act.” Washington
Post. March, 26.
Johnson, Carrie. n.d. “FBI Chief Urges Renewal of Patriot Act Measures That Will
Expire in December.” The Washington Post http://www.washingtonpost.com/wp-
dyn/content/article/2009/03/25/AR2009032501862.html (Accessed January 20,
2011).
Kaplan, John. 1961. “Search and Seizure: A No-Man’s Land in the Criminal Law.”
California Law Review 49:474-503.
Keller, Susan Jo. 2007. Judge Rules Provisions in Patriot Act to Be Illegal. The New
York Times. September 27.
Martin, Kate. 2002. “Intelligence, Terrorism, and Civil Liberties.” Human Rights. Winter.
Martin, Kate. 2004. “Domestic Intelligence and Civil Liberties.” SAIS Review. Winter.
McNeill, Jena B. 2009. “Patriot Act: A Chance to Commit to National Security.” Heritage
Foundation. October 9. http://www.heritage.org/research/reports/2009/10/patriot-
act-a-chance-to-commit-to-national-security
“Must we Trade Rights for Security?”
http://heinonline.org/HOL/PDF?handle=hein.journals/cdozo27&collection=journal
s&id=2171&print=72§ioncount=1&ext=.pdf
Neier, Aryeh. 2003. Taking liberties: four decades in the struggle for rights. 1st ed. New
York: Public Affairs.
Nieto, Marcus. “Public Video Surveillance: Is It An Effective Crime Prevention Tool?”
California Research Bureau. June 1997. (http://www.library.ca.gov/crb/97/05/)
Strom, Ron. “Patriot Act II: Pro-security, or Anti-freedom?” December 5, 2004. World
Net Daily. (http://www.wnd.com/news/article.asp?ARTICLE_ID=41722)
Setty, Sudha. 2009. “National Security Without Secret Laws.” American Constitution
Society for Law and Policy.
http://www.acslaw.org/files/Setty%20Issue%20Brief.pdf
EXTENDED B IB L I OGRAPHY
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
55
Transactional Records Access Clearinghouse. “National Profile and Enforcement:
Trends Over Time.” 2006. (http://trac.syr.edu/tracfbi/newfindings/current/)
US. Department Of Justice. 2004. “Report From The Field: The USA Patriot Act At
Work.” Washington, D.C.
Yeh, B. and C. Doyle. 2006. “USA PATRIOT Improvement and Reauthorization Act of
2005: A Legal Analysis” Congressional Research Service. RL33332.
(http://www.fas.org/sgp/crs/intel/RL33332.pdf)
Zogby, James. “Hearing on ‘Reauthorization of the PATRIOT Act’.” June 10, 2005.
The Arab American Institute. (http://www.aaiusa.org/dr-zogby/4151)
¢ DATA MINING
Bamford and PBS: Nova. 2009. “The Spy Factory.” Public Broadcasting Service.
February 3, 2009. (http://www.pbs.org/wgbh/nova/military/spy-factory.html)
Bamford, James. 2008. The Shadow Factory: The Ultra-Secret NSA from 9/11 to the
Eavesdropping on America. Doubleday.
Bankston, Kevin. “Court Rejects Government’s Executive Power Claims and Rules
That Warrantless Wiretapping Violated Law.” March 31, 2010. Electronic Frontier
Foundation. (http://www.eff.org/deeplinks/2010/03/court-rules-warrantless-
wiretapping-illegal)
Bergman, Lowell, Eric Lichtblau, Scott Shane, and Don van Natta Jr. 2006. “Spy
Agency Data After Sept. 11 Led F.B.I. to Dead Ends.” The New York Times.
January, 17. http://www.nytimes.com/2006/01/17/politics/17spy.html
Chiarella, Major Louis A. and Newton, Major Michael A. 1997. “So Judge, How Do I Get
That FISA Warrant?” The Policy and Procedure for Conducting Electronic
Surveillance. The Army Lawyer. October 1997.
Committee Print. 2007. CMP-2007-SER-0032. FISA Modernization and Carrier Liability.
January 23. LexisNexis Congressional Research Digital Collection.
Congressional Hearing. 2004. HRG-2004-HJH-0066. Privacy and Civil Liberties in
the Hands of the Government Post-Sept. 11, 2001: Recommendations of the
9/11 Commission and the U.S. Department of Defense Technology and Privacy
Advisory Committee. August 20. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2006. HRG-2006-HGR-0088. National Security Whistleblowers
in the Post-Sept. 11th Era: Lost in a Labyrinth and Facing Subtle Retaliation.
February 14. LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2006. HRG-2006-HJH-0024. Legislative Proposals To Update
the Foreign Intelligence Surveillance Act (FISA). September 6. LexisNexis
Congressional Hearings Digital Collection.
Congressional Hearing. 2006. HRG-2006-HJH-0051. Electronic Surveillance
Modernization Act. September 12. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2006. HRG-2006-HJH-0062. “Constitution in Crisis: Domestic
Surveillance and Executive Power”. January 20. LexisNexis Congressional
Hearings Digital Collection.
Congressional Hearing. 2006. HRG-2006-ISS-0002. Nomination of General Michael V.
Hayden, USAF To Be Director of the Central Intelligence Agency. May 18.
LexisNexis Congressional Hearings Digital Collection.
Congressional Hearing. 2006. HRG-2006-SJS-0017. Wartime Executive Power and the
National Security Agency’s Surveillance Authority. February 6. LexisNexis
Congressional Hearings Digital Collection.
Congressional Hearing. 2007. HRG-2007-HJH-0042. Constitutional Limitations
on Domestic Surveillance. June 7. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2007. HRG-2007-ISS-0003. Modernization of the Foreign
Intelligence Surveillance Act. May 1. LexisNexis Congressional Hearings
Digital Collection.
Congressional Hearing. 2009. HRG-2009-ASH-0103. [Cyberspace as a Warfighting
Domain: Policy, Management and Technical Challenges to Mission Assurance].
May 5. LexisNexis CongressionalHearings Digital Collection.
Congressional Hearing. 2009. HRG-2009-SJS-0064. [Cybersecurity: Preventing
Terrorist Attacks and Protecting Privacy in Cyberspace]. November 17.
LexisNexis Congressional Hearings Digital Collection.
Congressional Research Service. 2006. CRS-2006-FDT-0180. Presidential Authority
to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence
Information. January 5. LexisNexis Congressional Research Digital Collection.
Federal Bureau of Investigation, Office of Inspector General. “Follow-up Audit
of the Terrorist Screening Center.” September 2007.
(http://www.justice.gov/oig/reports/FBI/a0741/intro.htm)
Fine, Glenn, Gordon Heddell, Patricia Lewis, George Ellard, and Roslyn Mazer. 2009.
“Unclassified Report on the President’s Surveillance Program.”
(http://www.dni.gov/reports/report_071309.pdf)
Gellman, Barton. 2005. The FBI’s Secret Scrutiny: In Hunt for Terrorist, Bureau Records
of Ordinary Americans. The Washington Post. November 6.
(http://www.washingtonpost.com/wp-
dyn/content/article/2005/11/05/AR2005110501366.html) (Accessed January 25,
2011.)
Gorman, Siobhan. “NSA’s Domestic Spying Grows As Agency Sweeps Up Data.”
March 10, 2008. Wall Street Journal.
(http://online.wsj.com/article/SB120511973377523845.html?mod=hps_us_whats
_news)
Jonas, Jeff and Jim Harper. 2006. “Effective Counter-Terrorism and the Limited Role
of Predictive Data.” December 11, 2006. The Cato Institute. Policy analysis
584:1–11. (http://www.cato.org/pub_display.php?pub_id=6784)
Keefe, Patrick Radden. 2006. Chatter: Uncovering the Echelon Surveillance Network
and the Secret World of Global Eavesdropping. Random House Trade
Paperbacks.
Liptak, Adam. 2007. “Spying Program May be Tested by Terror Case.” The New York
Times. August, 26. http://www.nytimes.com/2007/08/26/us/26wiretap.html
Markle Foundation Task Force. “Meeting the Threat of Terrorism. Authorized Use:
An Authorized Use Standard for Infomaiton Sharing Strengthens National
Security and Respects Civil Liberties.”
Markle Foundation Task Force. 2002. “Protecting America’s Freedom in The Information
Age: A Report of the Markle Foundation Task Force.
National Research Council (U.S.). 2008. Protecting Individual Privacy in the Struggle
Against Terrorists: A Framework for Program Assessment. Washington D.C.:
National Academies Press.
Office of the Director of National Intelligence. 2009b. “Data Mining Report.”
(http://www.dni.gov/electronic_reading_room/ODNI_Data_Mining_Report_09.pdf)
Powers, Thomas. 2005. “Black Arts.” The New York Review of Books 52.
(http://www.nybooks.com/articles/17974)
Public Broadcasting Service. “Ask the Expert: Jim Bamford.” Nova Episode: Spy
Factory, February 9, 2009. (http://www.pbs.org/wgbh/nova/spyfactory/ask.html)
EXTENDED B IB L I OGRAPHY
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Risen, James, and Charlie Savage. “Court Ruling on Wiretap Is a Challenge for
Obama.” The New York Times, April 1 2010
(http://www.nytimes.com/2010/04/02/us/politics/02nsa.html?ref=us)
Savage, Charlie and James Risen. “Federal Judge Finds N.S.A. Wiretaps Were Illegal.”
March 31, 2010. New York Times.
(http://www.nytimes.com/2010/04/01/us/01nsa.html) (Accessed January 20,
2011.)
Schneier, Bruce. “U.S. enables Chinese hacking of Google.” January 23, 2010.
CNN.com.
(http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/index.html)
(Accessed January 20, 2011.)
Shachtman, Noah. “’Don’t Be Evil,’ Meet ‘Spy on Everyone’: How the NSA Deal Could
Kill Google.” Wired.com, February 4, 2010.
(http://www.wired.com/dangerroom/2010/02/from-dont-be-evil-to-spy-on-
everyone/) (Accessed January 20, 2011.)
The Constitution Project. 2010. “Principles for Government Data Mining: Perserving
Civil Liberties in the Information Age.” Washington, D.C.
¢ ETHNIC AND RELIGIOUS PROFIL ING
ACLU. 2008. “Secure Flight Re-Engineering Welcomed but Watchlist Problems Remain
Unaddressed.” October 22, 2008. American Civil Liberties Union.
(http://www.aclu.org/technology-and-liberty/secure-flight-re-engineering-
welcomed-watchlist-problems-remain-unaddressed) (Accessed January 20,
2011.)
“Airport Security.” New York Times. January 6, 2010. Times Topics.
(http://topics.nytimes.com/top/reference/timestopics/subjects/a/airport_security/in
dex.html) (Accessed January 20, 2011.)
Chakrabarti, Samidh and Aaron Strauss. 2002. “Carnival Booth” Law and Ethics On The
Electronic Frontier. Massachusetts Institute of Technology Computer Science
and Artificial Intelligence Laboratory Student Papers Spring 2002. Chapter 3.1.
May 16, 2002. (http://groups.csail.mit.edu/mac/classes/6.805/student-
papers/spring02-papers/caps.htm#_Toc9406731) (Accessed January 20, 2011.)
Congressional Hearing. 2003. HRG-2003-SJS-0001. Visa Issuance and Homeland
Security. LexisNexis Congressional Hearings Digital Collection.
Congressional Research Service. 2003. CRS-2003-DSP-0112. Foreign Students in the
United States: Policies and Legislation. January 24. LexisNexis Congressional
Research Digital Collection.
Department of Homeland Security. “Secretary Napolitano Announces New Measures to
Strengthen Aviation Security.” April 2, 2010.
(http://www.dhs.gov/ynews/releases/pr_1270217971441.shtm) (Accessed
January 20, 2011.)
Department Of Justice. 2003. “DOJ Racial_Profiling_Fact_Sheet.pdf.” June 17, 2003.
(http://www.justice.gov/opa/pr/2003/June/racial_profiling_fact_sheet.pdf)
(Accessed January 20, 2011.)
Epps, Garrett. “Vengeance is Brandon Mayfield’s.” October 3, 2007. Salon.com.
(http://dir.salon.com/story/news/feature/2007/10/03/brandon_mayfield/index.html)
(Accessed January 20, 2011.)
Globalsecurity.org. “National Security Entry Exit Registration System (NSEERS).
(http://www.globalsecurity.org/security/ops/nseers.htm) (Accessed January 20,
2011.)
Goldberg, Jeffrey. 2008. The Things He Carried. The Atlantic. November 2008.
(http://theatlantic.com/magazine/archive/2008/11/the-things-he-carried/7057/)
(Accessed January 25, 2011)
56
Government Accountability Office. 2003. “GAO-03-459: Justice Department’s Project
to Interview Aliens after September 11, 2001.” Washington, D.C.
Government Accountability Office. 2003. “GAO-03-459. Homeland Security:
Justice Department’s Project to Interview Aliens after September 11, 2001.”
Washington, D.C.
Government Accountability Office. 2007. “GAO-07-378T. Border Security: US-VISIT
Program Faces Strategic, Operational, and Technological Challenges at Land
Ports of Entry.” Washington, D.C.
Government Accountability Office. 2007. “GAO-07-632T. Homeland Security: US-Visit
Program Faces Operational, Technological, and Management Challenges.”
Washington, D.C.
Government Accountability Office. 2008. “GAO-08-361. Homeland Security: Strategic
Solution for US-VISIT Program Needs to be Better Defined, Justified, and
Coordinated.” Washington, D.C.
Government Accountability Office. 2010. “GAO-10-535R: Aviation Security: Efforts to
Validate TSA’ Passenger Screening Behavior Detection Program Underway, but
Opportunities Exist to Strengthen Validation and Address Operational
Challenges.” Washington D.C.
Government Accountability Office. 2010. “GAO-10-763. Aviation Security: Efforts to
Validate TSA’s Passenger Screening behavior Detection Program Underway, but
Opportunities Exist to Strengthen Validation and Address Operational
Challenges.” Washington, D.C.
Hampson, Rick. “USATODAY.com - Anti-snitch Campaign Riles Police, Prosecutors.”
March 29, 2006. (http://www.usatoday.com/news/nation/2006-03-28-stop-
snitching_x.htm) (Accessed January 20, 2011.)
Hsu, Spencer and Carrie Johnson. “TSA Accidentally Reveals Airport Security Secrets.”
December 9, 2009. Washington Post. (http://www.washingtonpost.com/wp-
dyn/content/article/2009/12/08/AR2009120803206_2.html?wpisrc=newsletter&wp
isrc=newsletter&wpisrc=newsletter&sid=ST2009120900011) (Accessed January
20, 2011.)
Malik, Hasnain. “Senators Slam US Screening System for Pakistanis.” AllVoices.com.
(http://www.allvoices.com/contributed-news/5069353-senators-slam-us-
screening-system-for-pakistanis) (Accessed January 20, 2011.)
McIntire, Mike. “Ensnared by Error on Growing U.S. Watch List.” April 6, 2010. New
York Times. (http://www.nytimes.com/2010/04/07/us/07watch.html) (Accessed
January 20, 2011.)
Metcalf, Eddy. 2010 “DHS To Review Screening Of Passengers By Observation
Techniques.” Aviation Online Magazine. May 25.
(http://avstop.com/news_may_2010/dhs_to_review_screening_of_passengers_b
y_observation_techniques.htm) (Accessed January 20, 2011.)
Press, W. H. 2009. “From the Cover: Strong Profiling is not Mathematically Optimal for
Discovering Rare Malfeasors.” Proceedings of the National Academy of
Sciences 106:1716-1719.
Rosenblatt, Dana. “Behavioral screening — the future of airport security?”
December 17, 2008. CNN.com.
(http://www.cnn.com/2008/TECH/12/02/airport.security/index.html) (Accessed
January 20, 2011.)
Sandomir, David. 2009. “Preventing Terrorism in the Long Term: The Disutility of Racial
Profiling in Preventing Crime and the Counterproductive Nature of Ethnic and
Religious Profiling in Counterterrorism Policing.” Master Thesis. Naval
Postgraduate School. Monterey, CA. http://handle.dtic.mil/100.2/ADA514381
Schneier, Bruce. “Profiling.” July 22, 2005. Schneier on Security Blog.
(http://www.schneier.com/blog/archives/2005/07/profiling.html) (Accessed
January 20, 2011.)
EXTENDED B IB L I OGRAPHY
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
57
Schneier, Bruce. “Racial Profiling No Better than Random Screening.” February 4,
2009. Schneier on Security Blog.
(http://www.schneier.com/blog/archives/2009/02/racial_profilin.html) (Accessed
January 20, 2011.)
Shora, Kareem and Shoba Sivaprasa Wadhia. “The Consequences of America’s Efforts
to Secure its Borders.” American-Arab Anti-Discrimination Committee. Pg. 29.
(http://www.adc.org/PDF/nseerspaper.pdf) (Accessed January 20, 2011.)
Tajfel, Henri. “Social Psychology of Intergroup Relations.” Annual Review Psychology.
1982. 33:1-39.
Thaindian News. 2010. “Resolution Against US Airport Screening Passed in Pakistan.”
January 13, 2010. The Indian News.
(http://www.thaindian.com/newsportal/south-asia/resolution-against-us-airport-
screening-passed-in-pakistan_100303005.html) (Accessed January 20, 2011.)
U.S. Immigration and Customs Enforcement. “Programs: Special Registration.”
(http://www.ice.gov/nseers/) (Accessed January 20, 2011.)
“Will Profiling Make a Difference?” January 4, 2010. Room for Debate Blog, New York
Times. (http://roomfordebate.blogs.nytimes.com/2010/01/04/will-profiling-make-
a-difference/) (Accessed January 20, 2011.)
“Would-Be Bomber Used Powerful Explosive.” December 27, 2009. CBS News.
(http://www.cbsnews.com/stories/2009/12/27/national/main6028366.shtml)
(Accessed January 20, 2011.)
Zeleny, Jeff. 2010. “Security Checks on Flights to U.S. to Be Revamped.”
The New York Times, April 1
(http://www.nytimes.com/2010/04/02/us/02terror.html?pagewanted=1&ref=us)
(Accessed January 20, 2011.)
Zogby, John. 2005. “Statement before the U.S. House of Representatives Committee
on the Judiciary.” Hearing on “Reauthorization of the PATRIOT Act.”
June 10, 2005.
¢ ENHANCED INTERROGATION
Alexander, Matthew. 2008. How to Break a Terrorist: The U.S. Interrogators Who Used
Brains, Not Brutality, To Take Down the Deadliest Man in Iraq. 1st ed. New York:
Free Press.
Bennett, R. 2007. “Endorsement by the Seminar Military Interrogators.” Peace and
Conflict: Journal of Peace Psychology 13:391–392.
Brehm, S. S, and J. W Brehm. 1981. Psychological reactance: A Theory of Freedom
and Control. New York: Academic Press.
Canfield, J. 2004. “The Torture Memos: The Conflict between a Shift in US Policy
towards a Condemnation of Human Rights and International Prohibitions against
the Use of Torture.” Hofstra Law Review 33:1049.
Central Intelligence Agency. 1963. KUBARK: Counter-Intelligence Interrogation-
July 1963.
(http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB122/CIA%20Kubark%201-
60.pdf) (Accessed January 20, 2011.)
Central Intelligence Agency. 2005. “Detainee Reporting Pivotal for the War Against
Al-Qa’ida”. June 3.
Cooley, S. C. 2008. “Entertainment Media and ‘Backstage’ Event Framing: How 24
Defines Torture.” (http://etd.lsu.edu/docs/available/etd-04012008-
134143/unrestricted/EntertainmentMediaThesis.pdf) (Accessed January 20,
2011.)
Costanzo, Mark. “Psychologists and the Use of Torture in Interrogations.”Analyses of
Social Issues and Public Policy. 2007.
(http://www3.interscience.wiley.com/journal/118537150/abstract?CRETRY=1&SR
ETRY=0) (Accessed January 20, 2011.)
Danzig, David. “Obama Says No to Torture; Interrogators Say Yes to Obama.”
February 27, 2009. The Huffington Post. (http://www.huffingtonpost.com/david-
danzig/obama-says-no-to-torture_b_160207.html) (Accessed January 20, 2011.)
Danzig, David. “What We Still Don’t Know About Torture.” February 11, 2009. The
Huffington Post. (http://www.huffingtonpost.com/david-danzig/what-we-still-dont-
know-a_b_166130.html) (Accessed January 20, 2011.)
Deci, E.L. and R.M. Ryan. 2004. Handbook of Self-Determination Research. Rochester:
University of Rochester Press.
Department of Defense. 2005. “Guantanamo Provides Valuable Intelligence
Information.” June 12. Office of the Assistant Secretary of Defense (Public
Affairs). (http://www.fas.org/irp/news/2005/06/dod061205.html) (Accessed
January 20, 2011.)
Dershowitz, Alan. 2002. Why Terrorism Works: Understanding the Threat, Responding
to the Challenge. New Haven: Yale University Press.
Eggen, Dan, and Walter Pincus. n.d. “FBI, CIA Debate Significance of Terror Suspect.”
The Washington Post http://www.washingtonpost.com/wp-
dyn/content/article/2007/12/17/AR2007121702151.html (Accessed January 20,
2011).
Fein, Robert, Paul Lehner, and Bryan Vossekuil. 2006. Educing Information: Science
and Art - Foundations for the Future. National Defense Inteligence College
Press.
Finn, Peter, and Joby Warrick. n.d. “Detainee’s Harsh Treatment Foiled No Plots.” The
Washington Post http://www.washingtonpost.com/wp-
dyn/content/article/2009/03/28/AR2009032802066.html (Accessed January 20,
2011).
Fox News Channel. 2009. “CIA Probe Fires Up Debate Over Whether Harsh
Interrogations Were Effective.” August 25, 2009.
(http://www.foxnews.com/politics/2009/08/25/cia-probe-fires-debate-harsh-
interrogations-effective/) (Accessed January 20, 2011.)
Goldsmith, Jack. 2009. “The Cheney Fallacy.” The New Republic. May 18.
(http://www.tnr.com/article/politics/the-cheney-fallacy?id=1e733cac-c273-48e5-
9140-80443ed1f5e2&p=1) (Accessed January 25, 2011.)
Helgerson, John. Special Review of Counter-Terrorism Detention and Interrogation
Activities (September 2001 — October 2003). Inspector General’s Report.
Central Intelligence Agency. May 7, 2004.
(http://luxmedia.com.edgesuite.net/aclu/IG_Report.pdf) (Accessed January 20,
2011.)
Hobfoll, S. E. 1991. “Traumatic Stress: A theory Based on Rapid Loss of Resources.”
Anxiety, Stress & Coping 4:187–197.
Holder, Eric. 2009. “Letter to John D. Rockefeller Narrating DOJ Advice to CIA
Regarding Legality of Enhanced Interrogation Techniques.”
(http://intelligence.senate.gov/pdfs/olcopinion.pdf) (Accessed January 20, 2011.)
Human Rights First. 2009. “Statement From 16 Retired Admirals And Generals,
Who Have Been Working Through Human Rights First, On Meeting Today With
President Obama To Discuss Executive Orders Banning Torture And Closing
Guantanamo.”
(http://www.humanrightsfirst.org/media/usls/2009/alert/388/index.htm)
(Accessed January 20, 2011.)
Isikoff, Michael. 2009. “We Could Have Done This the Right Way.” Newsweek.
April 25, 2009.
EXTENDED B IB L I OGRAPHY
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Isikoff, Michael. 2009. “Ali Soufan Breaks His Silence - Newsweek.” Newsweek,
April 25 (http://www.newsweek.com/2009/04/24/we-could-have-done-this-the-
right-way.html) (Accessed July 3, 2010).
Jacobs, Andrew. 2010. “China Bans Court Evidence Gained Through Torture.”
The New York Times. May 31, 2010.
Jacobs, Andrew. 2010. “China Bans Court Evidence Gained Through Torture.”
The New York Times, May 31
(http://www.nytimes.com/2010/06/01/world/asia/01china.html) (Accessed January
20, 2011.
Josceleyn, Thomas. “the ‘Most Prolific’ Detainee.” The Weekly Standard. September 7.
http://www.weeklystandard.com/Content/Public/Articles/000/000/016/883kzm
tj.asp
Lassiter, G. 2004. Interrogations, Confessions, and Entrapment. New York:
Kluwer Academic/Plenum Publishers.
Lasson, K. 2007. “Torture, Truth Serum, and Ticking Bombs: Toward a Pragmatic
Perspective on Coercive Interrogation.” Loyola University – Chicago Law
Journal. 39:329.
Levit, Kenneth J. 2005. “The CIA and the Torture Controversy.” Journal of National
Security Law and Policy. Vol. 1:341.
Mason O.J., Brady F. 2009. “The Psychotomimetic Effects of Short-term Sensory
Deprivation’. Journal of Nervous and Mental Disorders. Vol. (10):783-5.
Mayer, Jane. 2010. “Counterfactual: A Curious History of the CIA’s secret Interrogation
Program.” The New Yorker. March 29, 2010
McCoy, Alfred. 2006. A Question of Torture: CIA Interrogation, from The Cold War to
The War on Terror. New York: Henry Holt and Co., Metropolitan Books.
Meek, James G. 2009. “U.S. Officials Slam Dick Cheney’s Claim that Waterboarding
9/11 Mastermind 183 Times was a ‘Success’.” New York Daily News. April 22.
NEFA Foundation. “CIA Congressional Briefs EIT.”
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/CIA_Congressional
BriefsEIT.pdf) (Accessed January 20, 2011.)
NEFA Foundation. “CIA Detainee Info Key for GWOT.”
(http://www.nefafoundation.org/miscellaneous/CIA_DetaineeReportingKeyAQ.pdf
) (Accessed January 20, 2011.)
Noah, Timothy. “Cheney Refuted.” August 25, 2009. Slate Magazine.
(http://www.slate.com/id/2226276?obref=obinsite) (Accessed January 20, 2011.)
Noah, Timothy. 2009. “Water-Bored: Al-Qaida’s Plot to Bomb the Library Tower was not
Worth Torturing Anyone Over.: Slate. April 21.
Pilcher, J. J., and A. I. Huffcutt. 1996. “Effects of Sleep Deprivation on Performance:
a Meta-Analysis.” Sleep 19:318.
Rejali, Darius. 2009. Torture and Democracy. Princeton University Press. Princeton, NJ.
Rose, David. 2008 “Tortured Reasoning.” Vanity Fair. December 16th
(http://www.vanityfair.com/magazine/2008/12/torture200812?currentPage=4)
(Accessed January 20, 2011.)
Rumney, Philip N.S. 2005-2006. “Is Coercive Interrogation of Terrorist Suspects
Effective?: A Response to Bargaric and Clarke.” University of San Francisco Law
Review. Vol. 40.
Scheppele, Kim L. 2005. “Hypothetical Torture in the ‘War on Terrorism.’” Journal of
National Security Law and Policy. Vol. 1:285.
Scott, George. 2003. The History of Torture Throughout the Ages. [Whitefish MT]:
Kessinger Pub
58
Seligman, Martin E. P., 1972 “Learned Helplessness.” Annual Review of Medicine. Vol.
23:407-12
Shane, Scott. 2008. “Inside a 9/11 Mastermind’s Interrogation.” The New York Times,
June 22, 2008. (http://www.nytimes.com/2008/06/22/world/americas/22iht-
22ksm.13873332.html) (Accessed January 20, 2011.)
Shane, Scott. 2008. “The Unstudied Art of Interrogation.” The New York Times, March 9.
(http://www.nytimes.com/2008/03/09/weekinreview/09shane.html) (Accessed
January 20, 2011.)
Shane, Scott. 2009. “Waterboarding Used 266 Times on 2 Suspects.” The New York
Times, April 20, 2009. (http://www.nytimes.com/2009/04/20/world/20detain.html)
(Accessed January 20, 2011.)
Shane, Scott. and Mark Mazzetti. 2009. “In Adopting Harsh Tactics, No Look at Past
Use.” The New York Times, April 22
(http://www.nytimes.com/2009/04/22/us/politics/22detain.html?_r=1&pagewanted=
print) (Accessed January 20, 2011.)
Sherman, L. W. 1993. “Defiance, Deterrence, and Irrelevance: A Theory of the Criminal
Sanction.” Journal of Research in Crime and Delinquency 30:445–473.
Smith, R. Jeffrey. “Hill Panel Reviewing CIA Tactics.” The Washington Post
(http://www.washingtonpost.com/wp-
dyn/content/article/2009/05/09/AR2009050902489.html) (Accessed January 20,
2011.)
Solomon, S., J. Greenberg, and T. Pyszczynski. 2004. “The Cultural Animal: Twenty
years of terror Management Theory and Research.” Handbook of Experimental
Existential Psychology 13–34.
Soufan, Ali. 2009. “My Tortured Decision.” The New York Times. April 23, 2009.
(http://www.nytimes.com/2009/04/23/opinion/23soufan.html) (Accessed January
20, 2011.)
Stein, Jeff. 2010. “CIA Man Retracts Claim on Waterboarding.” Foreign Policy.
January 26, 2010.
Suedfield, Peter. 2007. “Torture, Interrogation, Security, and Psychology: Absolutist
versus Complex Thinking.” Analyses of Social Issues and Public Policy. Vol7:1.
Pp1-9.
Sunday Times. 2009. “September 11 Mastermind Khalid Sheikh Mohammed
‘Waterboarded’ 183 Times.” The Times (UK). April 20, 2009.
(http://www.timesonline.co.uk/tol/news/world/us_and_americas/article6130165.ece
) (Accessed January 20, 2011.)
Thiessen, Marc A. 2009. “The CIA’s Questioning Worked.” Washington Post. April 21.
Thiessen, Marc. 2009. “New Documents Show the CIA, Not the FBI, Got Zubaydah to
‘Cough Up’ Jose Padilla.” The National Review Online. October 31.
http://www.nationalreview.com/corner/189459/new-documents-show-cia-not-fbi-
got-zubadayh-cough-jose-padilla/marc-thiessen
United States Senate Select Committee on Intelligence. 2006. “Report on Postwar
Findings about Iraq’s WMD Programs and Links to Terrorism and How they
Compare with Prewar Assessments.” September 8, 2006.
(http://www.fas.org/irp/congress/2006_rpt/srpt109-331.pdf) (Accessed January 20,
2011.)
Warrick, Joby, and Peter Finn. n.d. “Interviews Offer Look at Roles of CIA Contractors
During Interrogations.” The Washington Post http://www.washingtonpost.com/wp-
dyn/content/article/2009/07/18/AR2009071802065.html (Accessed January 20,
2011).
EXTENDED B IB L I OGRAPHY
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
59
¢ DETENTION AND PROSECUTION
OF TERROR SUSPECTS
Bartosiewicz, Petra. “Terrorism Trial in New York Carries Few Risks for Government.”
November 29, 2009. Los Angeles Times.
(http://www.latimes.com/news/opinion/commentary/la-oe-petra29-
2009nov29,0,477313.story) (Accessed January 20, 2011.)
Burch Elias, Stella. “Rethinking ‘Preventative Detention’ From A Comparative
Perspective: Three Frameworks For Detaining Terror Suspects.” Columbia
Human Rights Law Review. 2009.
(http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1087&context=st
udent_papers) (Accessed January 20, 2011.)
Campbell, Benton J. 2009. Memorandum of Law in Support of the Government’s Motion
for a Permanent Order of Detention: United States of America v. Najibullah Zazi.
September 24.
Campbell, Benton. 2009. Criminal Complaint: United States of America v. Najibullah
Zazi. United States District Court for the District of Colorado. September 24.
Cohen, Andrew. “Khalid Sheik Mohammed and You.” November, 16, 2009.
(http://www.theatlantic.com/doc/200911u/prosecuting-sheik-mohammed)
(Accessed January 20, 2011.)
Congressional Hearing. 2008. HRG-2008-HJH-0085. From the Department of Justice to
Guantanamo Bay: Administration Lawyers and Administration Interrogation Rules
(Part V). July 17. LexisNexis Congressional Hearings Digital Collection.
Damphousse, Kelly and Brent L. Smith. 2002. “The American Terrorism Study: Patterns
of Behavior, Investigation and Prosecution of American Terrorists.” March 27,
2002. (http://www.ncjrs.gov/pdffiles1/nij/grants/193420.pdf)
Economist Magazine Blog: Democracy in America. “A Trying Debate.” November 18,
2009. Economist.com
(http://www.economist.com/blogs/democracyinamerica/2009/11/a_trying_debate)
(Accessed January 20, 2011.)
Eig, Larry, M. 1989. “Classified Procedures Act (CIPA): An Overview.” March 2, 1989.
(http://fas.org/sgp/crs/secrecy/89-172.pdf)
Elliott, Justin. “Are Military Tribunals Really Tougher On Terrorists Than Criminal
Courts?” February 3, 2010. Talking Points Memo Muckraker.
(http://tpmmuckraker.talkingpointsmemo.com/2010/02/are_military_tribunals_reall
y_tougher_than_criminal_courts.php) (Accessed January 20, 2011.)
Glaberson, William. 2008. “5 Charged in 9/11 Attacks Seek to Plead Guilty.”
The New York Times, December 9
http://www.nytimes.com/2008/12/09/us/09gitmo.html?_r=1 (Accessed July 3,
2010).
Greenberg, Karen, Jeff Grossman, Francesca Laguardia, Michael Price, and Jason
Porta. 2010. “Terror Trial Report Card 2001-2009.” The NYU School of Law
Center on Law and Security.
(http://www.lawandsecurity.org/publications/TTRCFinalJan14.pdf) (Accessed
January 20, 2011.)
Gude, Ken. “Criminal Courts Are Tougher on Terrorists than Military Detention.” January
20, 2010. Center for American Progress.
(http://www.americanprogress.org/issues/2010/01/criminal_courts_terrorists.html)
(Accessed January 20, 2011.)
Hakimi, Monica. 2007. “International Standards for Detaining Terrorism Suspects:
Moving beyond the Armed Conflict-Criminal Divide.” Case Western Reserve
Journal of International Law 40:593.
Helgerson, John. 2004. Special Review of Counter-Terrorism Detention and
Interrogation Activities (September 2001 — October 2003). Inspector General’s
Report. Central Intelligence Agency. May 7.
(http://luxmedia.com.edgesuite.net/aclu/IG_Report.pdf) (Accessed January 20,
2011.)
Horton, Scott. “The Guant�namo Lawyers —Six Questions for Mark Denbeaux and
Jonathan Hafetz.” November 23, 2009. Harper’s Magazine.
(http://www.harpers.org/archive/2009/11/hbc-90006117) (Accessed January 20,
2011.)
Human Rights First. “Military Commissions.”
(http://www.humanrightsfirst.org/us_law/detainees/militarytribunals.aspx)
Lefkowitz, Josh. 2008. “Terrorists Behind Bars” May 5, 2008.
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/TerroristsBehindBar
s.pdf)
Leo, Richard A. 2000. “Questioning the Relevance of Miranda in the Twenty-First
Century.” Michigan Law Review 99:1000.
Markon, Jerry and Josh White. “Bin Laden Driver Gets 51/2 Years; U.S. Sought 30.”
Washington Post. August 8, 2008. (http://www.washingtonpost.com/wp-
dyn/content/article/2008/08/07/AR2008080700248_2.html?sid=ST200808080003
8&s_pos=) (Accessed January 20, 2011.)
McCarthy, Andrew. “Gitmo Does Not Cause Terrorism.” December 17, 2009. National
Review Online.
(http://article.nationalreview.com/print/?q=NWJhNjU2YzBlNjE1ZGMzYmU2MzEw
ZmZkNGI2YzIyY2Y=) (Accessed January 20, 2011.)
McCarthy, Andrew. “Holder’s Haste Makes Waste of Intel.” January 7, 2010. National
Review Online.
(http://article.nationalreview.com/print/?q=YmQwZWZlY2RjMTc0NjdhMTNjNzkyZj
ZiYTVlYTA3Yzc=) (Accessed January 20, 2011.)
McCarthy, Andrew. “Kill or Capture?” February 18, 2010. National Review Online.
(http://article.nationalreview.com/print/?q=YWY4NmFkZmRlNDcyMDI0OWI2NzF
hNTQ2YmVjZjAyZmI=) (Accessed January 20, 2011.)
McCarthy, Andrew. “No Compromise on Enemy Combatants.” February 12, 2010.
National Review Online.
(http://article.nationalreview.com/print/?q=ZjkzNDk5ODkwOWI5MmQzZmU3Nzk2
NjcxYzIyMDQwM2Q=) (Accessed January 20, 2011.)
McCarthy, Andrew. “Reversing Obama on the KSM Trial.” December 2, 2009. National
Review Online.
(http://article.nationalreview.com/print/?q=MzIwMmIxMWQyZTEyZDRiMjI4ZjU0Y
mUyZTkyNjM4OGY=) (Accessed January 20, 2011.)
McCarthy, Andrew. “September 10? It’s Worse Than That.” November 13, 2009.
National Review Online.
(http://article.nationalreview.com/print/?q=ZjNjZTljN2MxMGI4MTJkNTMxODA4Yj
A5MGNiMmRlYWM=) (Accessed January 20, 2011.)
McCarthy, Andrew. “The Gitmo Volunteers.” March 5, 2010. National Review Online.
(http://article.nationalreview.com/print/?q=Mjg3ZWRlNTIzMDUxOTk2NDdhYzgw
MWVmZjEzNzQwNTI=) (Accessed January 20, 2011.)
Napolitano, Andrew. “The Case Against Military Tribunals.” November 29, 2009.
(http://www.latimes.com/news/opinion/la-oe-napolitano29-
2009nov29,0,6594004.story) (Accessed January 20, 2011.)
Ryan, Joe. 2010. “N.J. Terror Suspects to Appear in Court for Bail Hearing.” The Star-
Ledger. June 10, 2010.
EXTENDED B IB L I OGRAPHY
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Savage, Charlie. 2009. “Accused 9/11 Mastermind to Face Civilian Trial in N.Y..” The
New York Times, November 14
http://www.nytimes.com/2009/11/14/us/14terror.html (Accessed January 20,
2011).
Soder, Brenda Bowser. 2009. “Statement From 16 Retired Admirals And Generals, Who
Have Been Working Through Human Rights First, On Meeting Today With
President Obama To Discuss Executive Orders Banning Torture And Closing
Guantanamo.” January 22, 2009.
(http://www.humanrightsfirst.org/category/media-room/press-releases/page/32/)
(Accessed January 20, 2011.)
Weiser, Benjamin and Colin Moynihan. 2010. “Guilty Plea in Plot to Bomb Times
Square.” The New York Times. June 21, 2010.
Weiser, Benjamin, and Colin Moynihan. 2010. “Guilty Plea in Plot to Bomb Times
Square.” The New York Times, June 21
(http://www.nytimes.com/2010/06/22/nyregion/22terror.html) (Accessed January
20, 2011.)
Wikisourse. “Verbatim Transcript of Combatant Status Review Tribunal Hearing for ISN
10024.”
(http://en.wikisource.org/wiki/Verbatim_Transcript_of_Combatant_Status_Review
_Tribunal_Hearing_for_ISN_10024)
Wittes, Benjamin. “Justice Delayed.” March 2006. The Atlantic.
(http://www.theatlantic.com/magazine/archive/2006/03/justice-delayed/4600/)
(Accessed January 20, 2011.)
Yoo, John. “The KSM Trial Will Be an Intelligence Bonanza for Al Qaeda.” November
15, 2009. Wall Street Journal.
http://online.wsj.com/article/SB1000142405274870443180457453737066583285
0.html
Zabel, Richard B. and James J. Benjamin, Jr. 2009. “In Pursuit of Justice: Prosecuting
Terrorism Cases in the Federal Courts.” August 2009. HumanRightsFirst.org.
(http://www.humanrightsfirst.org/2009/08/23/5655/) (Accessed January 20, 2011.)
¢ THE TERRORIST THREATBeck, Ulrich. 2009. World At Risk. English ed. Cambridge UK; Malden MA: Polity.
Behrens, C., and M. Holt. 2005. “Nuclear Power Plants: Vulnerability to Terrorists
Attack.” Congressional Research Service, February 4.
Bergen, Peter and Bruce Hoffman. 2010. “Assessing the Terrorist Threat: A Report of
the Bipartisan Policy Center’s National Security Preparedness Group.” Bipartisan
Policy Center. Washington, D.C. September 10.
Bergen, Peter and Paul Cruickshank. 2008. The Unraveling. The New Republic. June
11. (http://www.tnr.com/article/the-unraveling-0) (Accessed January 25, 2011)
Bergen, Peter. 2002. Holy War, Inc.: Inside the Secret World of Osama bin Laden. 1st
ed. Free Press.
Bergen, Peter. 2006. The Osama bin Laden I know: An Oral History of Al-Qaeda’s
leader. 1st Ed. New York: Free Press.
Bergen, Peter. 2010. Why U.S. Can’t Find Osama bin Laden. Cnn, International.
October 18.
(http://edition.cnn.com/2010/WORLD/asiapcf/10/18/afghanistan.bin.laden/index.h
tml?iref=allsearch) (Accessed January 25, 2011)
60
Crenshaw, Martha. 1986. “The Psychology of Political Terrorism,” in Political
Psychology: Contemporary Problems and Issues, pp. 379-413, edited by
Margaret G. Hermann. San Francisco: Jossey-Bass, 1986. Reprinted in John T.
Jost and Jim Sidanius, eds., Political Psychology: Key Readings (Taylor and
Francis, 2004).
Crenshaw, Martha. 1995. Terrorism in Context. University Park, PA: Pennsylvania State
University Press.
Crenshaw, William A. 1988. Annals of the American Academy of Political Science, Vol.
498, The Private Security Industry: Issues and Trends, pp. 60-69. July 1988.
(http://www.jstor.org/stable/1045381) (Accessed January 25, 2011)
“Declassified_NIE_Key_Judgments.pdf (application/pdf Object).”
(http://www.dni.gov/press_releases/Declassified_NIE_Key_Judgments.pdf)
(Accessed January 21, 2011.)
Department of State. 2001. “Patterns of Global Terrorism.”
(http://www.state.gov/documents/organization/10319.pdf) (January 21, 2011.)
Department of State. 2002. “Patterns of Global Terrorism.”
(http://www.state.gov/documents/organization/20177.pdf) (Accessed January 21,
2011.)
Department of State. 2003. “Patterns of Global Terrorism.”
(http://www.state.gov/documents/organization/31912.pdf) (Accessed January 21,
2011.)
Department of State. 2004. “Country Reports on Terrorism.”
(http://www.state.gov/s/ct/rls/crt/c14818.htm) (Accessed January 21, 2011.)
Department of State. 2005. “Country Reports on Terrorism.”
(http://www.state.gov/s/ct/rls/crt/2005/) (Accessed January 21, 2011.)
Department of State. 2006. “Country Reports on Terrorism.”
(http://www.state.gov/s/ct/rls/crt/2006/index.htm) (Accessed January 21, 2011.)
Department of State. 2007. “Country Reports on Terrorism.”
(http://www.state.gov/documents/organization/105904.pdf) (Accessed January
21, 2011.)
Department of State. 2008. “Country Reports on Terrorism.”
(http://www.state.gov/documents/organization/122599.pdf)
Dershowitz, Alan. 2002. Why Terrorism Works: Understanding the Threat, Responding
to the Challenge. New Haven: Yale University Press.
Doran, Michael. 2002. “The Pragmatic Fanaticism of Al Qaeda.” Political Science
Quarterly. V117: Summer. P177-190.
Farah, Douglass. 2008. “NEFA - criminal terrorist nexus.” Nefa Foundation, January 14,
2008. (http://www1.nefafoundation.org/miscellaneous/nefapipelines0108.pdf)
Farrall, Leah. “Hotline to the jihad.” December 7, 2009. The Australian.
(http://www.theaustralian.com.au/news/features/hotline-to-the-jihad/story-
e6frg6z6-1225807501121) (Accessed January 21, 2011.)
Federation of American Scientists. 2010. “Chemical Weapons Production and Storage.”
(http://www.fas.org/programs/bio/chemweapons/production.html) (Accessed
January 21, 2011.)
Geiger, H. J. 2001. “Terrorism, Biological Weapons, and Bonanzas: Assessing the Real
Threat to Public Health.” American Journal of Public Health 91:708.
Gerges, Fawaz A. 2005. The Far Enemy. Cambridge University Press.
German, Mike. 2007. Thinking Like a Terrorist: Insights of a Former FBI Undercover
Agent. 1st ed. Washington D.C.: Potomac Books.
EXTENDED B IB L I OGRAPHY
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
61
Glenn, David. “Anthropologists in a War Zone: Scholars Debate Their Role.” November
30, 2007. The Chronicle of Higher Education.
(http://chronicle.com/article/Anthropologists-in-a-War-Zone-/34710) (January 21,
2011.)
Graham, Bob, and Commission on the Prevention of Weapons of Mass Destruction
Proliferation and Terrorism (U.S.). 2008. World at Risk: The Report of the
Commission on the Prevention of WMD Proliferation and Terrorism. 1st ed. New
York: Vintage Books.
Hoffman, Bruce. 2006. Inside terrorism. Rev. and expanded ed. New York: Columbia
University Press.
Knobler, S., A. A.F Mahmoud, and L. A Pray. 2002. Biological Threats and Terrorism:
Assessing the Science and Response Capabilities: Workshop Summary.
National Academy Press.
Kohlmann, Evan F. 2007. “NEFA - Abu Jihaad Expertreport.pdf.” Nefa Foundation,
August 2007.
(http://www1.nefafoundation.org/miscellaneous/abujihaadexpertreport.pdf)
(Accessed January 21, 2011)
Kohlmann, Evan F. 2007. “NEFA - Al Qaeda Media Organizations.” Nefa Foundation,
2007.
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefajihadmedia0309
.pdf) (Accessed January 21, 2011.)
Kohlmann, Evan F. 2007. “NEFA - Amawi et al.” Nefa Foundation, August 2007.
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/amawiexpertreport0
608.pdf) (Accessed January 21, 2011.)
Kohlmann, Evan F. 2007. “NEFA - Core Al Qaeda in 2008.” Nefa Foundation, 2007.
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa_AQin2008.pdf)
(Accessed January 21, 2011.)
Kunreuther, H., E. Michel-Kerjan, and B. Porter. 2003. “Assessing, managing, and
financing extreme events: dealing with terrorism.” National Bureau of Economic
Research Working Paper No.10179. (http://www.nber.org/papers/w10179)
(Accessed January 21, 2011.)
Leitenberg, Milton. 2009. “Assessing the Threat of Biological Weapons and
Bioterrorism: A Public Policy Issue?” Presentation. Cornell University. April 16,
2009.
Lewis, J. A. 2002. “Assessing the Risks of Cyber Terrorism, Cyber War and Other
Cyber Threats.” Center for Strategic and International Studies 1–12.
National Counter-Terrorism Center. 2009. “2008 Report on Terrorism.”
(http://wits.nctc.gov/ReportPDF.do?f=crt2008nctcannexfinal.pdf) (Accessed
January 21, 2011.)
National Intelligence Council. 2007. “The Terrorist Threat to the Homeland.”
(http://www.dni.gov/press_releases/20070717_release.pdf) (Accessed January
21, 2011.)
“NEFA - German Pakistan Aleem Nasir.”
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa_AleemNasirNe
twork0609.pdf) (Accessed January 21, 2011.)
“NEFA - London bombings.”
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa721bombings.p
df) (Accessed January 21, 2011.)
“NEFA - Saudi Al Qaeda.” (http://nefafoundation.org/miscellaneous/qaidasaudi02-
03.pdf) (Accessed January 21, 2011.)
“NEFA - Spanish Suicide Bombers.”
(http://www1.nefafoundation.org/miscellaneous/nefaspainmartyrs08.pdf)
(Accessed January 21, 2011.)
“NEFA - Taliban during Peace Accord Era.”
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefatalibanpakfebm
ay08.pdf) (Accessed January 21, 2011.)
“NEFA - terrorism big picture STRATEGY.”
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefafarahhousefarh
affairs.pdf) (Accessed January 21, 2011.)
“NEFA - The Madrid Indictment.”
(http://www.nefafoundation.org/miscellaneous/nefaaqspain1107.pdf) (Accessed
January 21, 2011.)
“NEFA - US v. Mohammad Ibrahim Shnewer et al.”
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa_ekftdixexpertr
eport.pdf) (Accessed January 21, 2011.)
“NEFA - Zarqawi’s Network.”
(http://nefafoundation.org/miscellaneous/zarqawichart1005.pdf) (January 21,
2011.)
“NEFA: Pakistan Takes on Taliban in Bajaur.”
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa_ttp0709part1.p
df) (January 21, 2011.)
NEFA Foundation. “CIAWINPAC_WMDJanDec2008.”
(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/CIAWINPAC_WMD
JanDec2008.pdf) (Accessed January 21, 2011.)
Noah, Timothy. “Why Hasn’t America Been Attacked Since 9/11?” September 11, 2009.
Slate Magazine. (http://www.slate.com/id/2227968?obref=obinsite) (Accessed
January 21, 2011.)
Parachini, J. 2003. “Putting WMD Terrorism into Perspective.” The Washington
Quarterly 26:37–50.
Pew Research Center. “Declines in Muslim Support for Bin Laden and Suicide
Bombing.” September 27, 2009. The New York Times.
(http://www.nytimes.com/imagepages/2009/09/27/weekinreview/20090927_SHA
NE_GRFK.html) (Accessed January 21, 2011.)
Rapoport, David. “Four Waves of Modern Terrorism.” UCLA International Institute
(http://www.international.ucla.edu/article.asp?parentid=47153) (Accessed
January 21, 2011.)
Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century.
Philadelphia: University of Pennsylvania Press.
Scahill, Jeremy. 2010. Killing Reconciliation. The Nation. October 27.
(http://www.thenation.com/article/155622/killing-reconciliation) (Accessed
January 25, 2011)
Tavares, J. 2004. “The Open Society Assesses its Enemies: Shocks, Disasters and
Terrorist Attacks.” Journal of Monetary Economics 51:1039–1070.
Tierney, John. 2002. “Even for $25 Million, Still No Osama bin Laden.” The New York
Times, December 1
Tucker, J. B. 2000. Toxic Terror: Assessing Terrorist Use of Chemical and Biological
Weapons. The MIT Press.
¢ SOCIAL SCIENCE OF SECURITY
Basu, A. 2005. “Social Network Analysis of Terrorist Organizations in India.” Pp. 26–28
in North American Association for Computational Social and Organizational
Science (NAACSOS) Conference.
EXTENDED B IB L I OGRAPHY
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
Bier, V. M. 2005. “Game-Theoretic and Reliability Methods in Counter-Terrorism and
Security.” Mathematical and Statistical Methods in Reliability (Wilson et al.,
editors), Scientific: Singapore, 17–28.
Brass, D. J, K. D Butterfield, and B. C Skaggs. 1998. “Relationships and Unethical
Behavior: A Social Network Perspective.” The Academy of Management Review
23:14–31.
Carley, K. M. 2006. A Dynamic Network Approach to the Assessment of Terrorist
Groups and the Impact of Alternative Courses of Action. Institute for Software
Research International, SCS, Carnegie Mellon University. (http://www.dtic.mil/cgi-
bin/GetTRDoc?AD=ADA477116&Location=U2&doc=GetTRDoc.pdf) (Accessed
January 21, 2011.)
Carley, K. M., J. Reminga, and S. Borgatti. 2003. “Destabilizing Dynamic Networks
Under Conditions of Uncertainty.” Pp. 121–126. International Conference on
Integration of Knowledge Intensive Multi-Agent Systems. September 30 –
October 4.
Centre for the Study of Civil War, International Peace Research Institute. “Data on
Armed Conflict.” 2007. http://www.prio.no/CSCW/Datasets/Armed-Conflict/
Creighton, C., and M. Shaw. 1987. The Sociology of War and Peace. Palgrave
Macmillan.
Deflem, M. 2004. “Social Control and the Policing of Terrorism: Foundations for a
Sociology of Counter-Terrorism.” The American Sociologist 35:75–92.
Deflem, Mathieu. 2010. The Policing of Terrorism: Organizational and Global
Perspectives. New York: Routledge.
Dillon, M. 2007. “Governing Through Contingency: The Security of Biopolitical
Governance.” Political Geography 26:41-47.
Dillon, M. 2008. “Underwriting security.” Security Dialogue 39:309.
Dillon, M. and Luis Lobo-Guerrero. 2008. “Biopolitics of Security in the 21st Century: An
Introduction.” Review of International Studies 34:265-292.
Dorn, Walter L. 1931. “The Prussian Bureaucracy in the Eighteenth Century.” Political
Science Quarterly 46:403-423.
Drake, Michael S. 2007. “Sociology and New Wars in the Era of Globalization.”
Sociology Compass 1:637-650.
Eban, Katherine.“The War on Terror: Rorschach and Awe.” Vf.com July 17, 2007.
(http://www.nickflynn.org/bomb_ticking_pdfs/23_eban.pdf)
Fogarty, B. E. 2000. War, Peace, and the Social Order. Westview Press.
Foucault, Michel. 1995. Discipline and Punish: The Birth of the Prison. 2nd ed. New
York: Vintage Books.
Foucault, Michel. N.D. Security, Territory, Population. Edited Transcript of Lectures at
the College de France 1977-1978. Editors: Michel Senellart. Palgrave Macmillan.
Frey, B. S, and S. Luechinger. 2004. “Decentralization as a Disincentive for Terror.”
European Journal of Political Economy 20:509–515.
Friedmann, W. 1956. “Some Impacts of Social Organization on International Law.” Am.
J. Int’l L. 50:475.
Ghosh, Tushar. 2010. Science and Technology of Terrorism and Counter-Terrorism. 2nd
ed. Boca Raton: CRC Press.
Hayes, Brian. “Connecting the Dots: Can the Tools of Graph Theory and Social-Network
Studies Unravel the Next Big Plot?” September 2006. American Scientist.
94:400–404.
(https://www.americanscientist.org/issues/id.3495,y.2006,no.9,content.true,page.
3,css.print/issue.aspx) (Accessed January 21, 2011.)
62
Hennessy, Bernard. “Book Reviews: Man, the State and War. By Kenneth N. Waltz.”
Political Research Quarterly. New York: Columbia University Press. 1959. Vol. 13
(1): 255. (http://prq.sagepub.com/cgi/reprint/13/1/255) (January 21, 2011.)
Hermann, Margaret G., and Charles W. Kegley. 1995. “Rethinking Democracy and
International Peace: Perspectives from Political Psychology.” International
Studies Quarterly 39:511-533.
Ivie, R. L. 1974. “Presidential Motives for War.” Quarterly Journal of Speech
60:337–345.
Jackson, R. 2005. Writing The War on Terrorism: Language, Politics and Counter-
Terrorism. Manchester University Press.
Jordan, F. 2008. “Predicting Target Selection by Terrorists: A Network Analysis of the
2005 London Underground Attacks.” International Journal of Critical
Infrastructures 4:206–214.
Kaplan, R. D. 2006. Imperial Grunts: On the Ground with the American Military, from
Mongolia to the Philippines to Iraq and Beyond. Vintage.
Kennedy, L. W., and C. M. Lum. n.d. “Developing a Foundation for Policy Relevant
Terrorism Research in Criminology. 2003.” Rutgers University: New Brunswick.
Kenney, M. 2003. “From Pablo to Osama: Counter-Terrorism Lessons from the War on
Drugs.” Survival 45:187–206.
Kestnbaum, M. 2009. “The Sociology of War and the Military.” Annual Review of
Sociology 35:235–254.
Klare, Michael. 2002. Resource Wars: The New Landscape of Global Conflict. 1st ed.
New York: Henry Holt.
Krebs, Ronald R. 2009. “In the Shadow of War: The Effects of Conflict on Liberal
Democracy.” International Organization 63:177-210.
Krebs, V. E. 2002. “Uncloaking terrorist networks.” First Monday. Volume 7,
No. 4. April 1.
Krebs, Valdis. “Social Network Analysis of the 9-11 Terrorist Network.” Orgnet.com.
(http://www.orgnet.com/hijackers.html) (Accessed January 21, 2011.)
Lang, K. 1972. Military Institutions and the Sociology of War: A Review of the Literature
with Annotated Bibliography. Sage Publications, Inc.
Langholtz, Harvey. 2004. The Psychology of Diplomacy. Westport Conn.: Praeger.
Lawless, W. F, M. Bergman, J. Lou�a, N. N Kriegel, and N. Feltovich. 2007. “A
Quantum Metric of Organizational performance: Terrorism and Counter-
Terrorism.” Computational & Mathematical Organization Theory 13:241–281.
Lemke, D. 2003. “Investigating the Preventive Motive for War.” International Interactions
29:273–292.
Loader, I. 2000. “Plural Policing and Democratic Governance.” Social & Legal Studies
9:323.
Luard, E. 1986. War in International Society: A Study in International Sociology. IB
Tauris & Company.
Male?evic, S. 2008. “The Sociology of New Wars? Assessing the Causes and
Objectives of Contemporary Violent Conflicts.” International Political Sociology
2:97–112.
Mann, Michael. 1986. The Sources of Social Power: Vols 1-2. Cambridge University
Press.
McCulloch, J., and S. Pickering. 2009. “Pre-Crime and Counter-Terrorism: Imagining
Future Crime in the ‘War on Terror’.” British Journal of Criminology 49:628.
EXTENDED B IB L I OGRAPHY
C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1
63
North, Douglass, J.J. Wallis, and B. Weingast. 2009. Violence and Social Orders:
A Conceptual Framework for Interpreting Recorded Human History. Cambridge;
New York: Cambridge University Press.
Omestad, Thomas. 1994. “Psychology and the CIA: Leaders on the Couch.” Foreign
Policy 105-122.
Pedahzur, A., and A. Perliger. 2006. “Changing Nature of Suicide Attacks: A Social
Network Perspective, The.” Social Forces. 84:4, 1987-2008.
Piazza, James A. 2009. “Is Islamist Terrorism More Dangerous? An Empirical Study
of Group Ideology, Organization, and Goal Structure.” Terrorism and Political
Violence 21:62.
Piegorsch, W. W, S. L Cutter, and F. Hardisty. 2007. “Benchmark analysis for
quantifying urban vulnerability to terrorist incidents.” Risk Analysis
27:1411–1425.
Rapoport, David. 2006. “Four Waves of Modern Terrorism.” UCLA International Institute
(http://www.international.ucla.edu/article.asp?parentid=47153) (Accessed
January 21, 2011.)
Rice, Stephen K. “Emotions and Terrorism Research: A Case for a Social-Psychological
Agenda.” Journal of Criminal Justice 37:248-255.
Richardson, L. F. 1960. Arms and insecurity: A Mathematical Study of the Causes and
Origins of War. Boxwood Press.
Rodriguez, J.A. 2005. “The March 11th Terrorist Network: In its Weakness Lies Its
Strength.” in XXV International Sunbelt Conference, Los Angeles.
Schmid, Alex P. 2004. “Frameworks for Conceptualizing Terrorism.” Terrorism and
Political Violence 16:197.
Scott, John. 2000. Social Network Analysis: A Handbook. 2nd ed. London: Sage
publications.
Sethi, K. 2009. “New World, New War: Understanding Global Jihad.”
Honors Projects 19.
Shane, Scott. “Words as Weapons - Dropping the ‘Terrorism’ Bomb.” April 2, 2010.
New York Times.
(http://www.nytimes.com/2010/04/04/weekinreview/04shane.html?ref=weekinrevi
ew) (Accessed January 21, 2011.)
Shapiro, S. 2002. “Conflict Media Strategies and the Politics of Counter-Terrorism.”
Politics 22:76–85.
Shaw, M. 2005. “The New Western Way of War: Risk-Transfer War and Its Crisis in
Iraq.” Polity.
Simonton, Dean Keith. 1998. “Introduction Political Leadership: Part I—World Heads of
State.” The Leadership Quarterly 9:239-242.
Smil, Vaclav. 2008. Global Catastrophes and Trends: The Next 50 years. Cambridge
MA: The MIT Press.
Sorokin, P. A. 1928. “The Sociology of War.” Contemporary Sociological Theories.
Harper: New York 49–102.
Sorokin, P. A. 1928. “Sociological Interpretation of the Struggle for Existence.”
Contemporary Sociological Theories. Harper: New York 49–102.
Steinley, D., S. Wasserman, and I. University. 2006. “Approximate Distributions of
Several Common Graph Statistics: Hypothesis Testing Applied to a Terrorist
Network.” Proceedings of the American Statistical Association, Statistical
Applications in Defense and National Security. Santa Monica, CA: RAND
Corporation.
Strachey, A. 1957. The Unconscious Motives of War: A Psycho-Analytical Contribution.
Allen & Unwin.
Suedfeld, Peter, and Dana C. Leighton. 2002. “Early Communications in the War
against Terrorism: An Integrative Complexity Analysis.” Political Psychology
23:585-599.
Taipale, K. A. 2005. “Destabilizing Terrorist Networks: Disrupting and Manipulating
Information Flows in the Global War on Terrorism.” Working Paper 05:04:01.
The Stilwell Center for Advanced Studies in Science and Technology Policy.
(http://www.information-retrieval.info/papers/infowar/Taipale-DTN-031805.pdf)
(Accessed January 21, 2011.)
The Minerva Initiative, Department of Defense. (http://minerva.dtic.mil/) (Accessed
January 21, 2011.)
Turk, A. T. 2004. “Sociology of Terrorism.” Annual Review of Sociology 30:271-286.
Tyler, Tom. 2006. Why People Obey the Law. Princeton N.J.: Princeton University
Press.
Volpp, Leti. 2001. “The Citizen and the Terrorist.” UCLA Law Review. 49:1575.
Waltz, Kenneth. 2001. Man, The State, and War: A Theoretical Analysis. New York:
Columbia University Press.
Weinberg, Leonard, Ami Pedahzur, and Sivan Hirsch-Hoefler. 2004. “The Challenges of
Conceptualizing Terrorism.” Terrorism and Political Violence 16:777.
Weisburd, David. 2009. To Protect and to Serve: Policing in an Age of Terrorism.
Dordrecht; New York: Springer.
EXTENDED B IB L I OGRAPHY
S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1
4 3 6 1 4 T H S T R E E T, S U I T E 8 2 0 , O A K L A N D , C A 9 4 6 1 2 , P H O N E : 5 1 0 - 5 5 0 - 8 8 0 0 ,
W E B S I T E : w w w. t h e b r e a k t h r o u g h . o r g
S P R I N G 2011
COUNTERTERROR ISM S INCE 9 /11 EVALUAT ING THE E F F I CACY OF CONTROVERS IAL TACT ICS